Action not permitted
Modal body text goes here.
cve-2023-1390
Vulnerability from cvelistv5
Published
2023-03-16 00:00
Modified
2024-08-02 05:49
Severity ?
EPSS score ?
Summary
A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
n/a | Linux kernel (TIPC kernel module) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:49:11.042Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5" }, { "tags": [ "x_transferred" ], "url": "https://infosec.exchange/%40_mattata/109427999461122360" }, { "tags": [ "x_transferred" ], "url": "https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20230420-0001/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Linux kernel (TIPC kernel module)", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Fixed in kernel 5.11-rc4" } ] } ], "descriptions": [ { "lang": "en", "value": "A remote denial of service vulnerability was found in the Linux kernel\u2019s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1050", "description": "CWE-1050", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-20T00:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5" }, { "url": "https://infosec.exchange/%40_mattata/109427999461122360" }, { "url": "https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6" }, { "url": "https://security.netapp.com/advisory/ntap-20230420-0001/" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2023-1390", "datePublished": "2023-03-16T00:00:00", "dateReserved": "2023-03-14T00:00:00", "dateUpdated": "2024-08-02T05:49:11.042Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-1390\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2023-03-16T21:15:11.447\",\"lastModified\":\"2023-11-07T04:03:26.057\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"A remote denial of service vulnerability was found in the Linux kernel\u2019s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]},{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1050\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.3\",\"versionEndExcluding\":\"4.9.253\",\"matchCriteriaId\":\"AF22C9B4-BCE0-4E42-8C4C-5DAE22C582DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.10\",\"versionEndExcluding\":\"4.14.217\",\"matchCriteriaId\":\"D777E229-ADCF-4C7F-A9F7-B2382137F407\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.15\",\"versionEndExcluding\":\"4.19.170\",\"matchCriteriaId\":\"671B1493-DB61-421B-B0A9-893B3A862EB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.4.92\",\"matchCriteriaId\":\"2F6DB7A0-9052-479E-894D-15F862F4D3BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.10\",\"matchCriteriaId\":\"AAA1C6A6-3B03-4EC3-935C-C9FA0B50DB70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.11:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"18B1C9CE-F7E4-426B-A770-79F86AB5CC38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.11:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A70E596-2EF7-4651-B2EF-2CEE31DB6893\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.11:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"18C82C96-2853-4DFE-93AD-F6E59B4129CA\"}]}]}],\"references\":[{\"url\":\"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://infosec.exchange/%40_mattata/109427999461122360\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20230420-0001/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
ghsa-875q-9h9j-qhmh
Vulnerability from github
Published
2023-07-06 19:24
Modified
2024-04-04 05:34
Severity ?
Details
A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.
{ "affected": [], "aliases": [ "CVE-2023-1390" ], "database_specific": { "cwe_ids": [ "CWE-1050" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2023-03-16T21:15:00Z", "severity": "HIGH" }, "details": "A remote denial of service vulnerability was found in the Linux kernel\u2019s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "id": "GHSA-875q-9h9j-qhmh", "modified": "2024-04-04T05:34:39Z", "published": "2023-07-06T19:24:11Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390" }, { "type": "WEB", "url": "https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6" }, { "type": "WEB", "url": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5" }, { "type": "WEB", "url": "https://infosec.exchange/%40_mattata/109427999461122360" }, { "type": "WEB", "url": "https://infosec.exchange/@_mattata/109427999461122360" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20230420-0001" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
rhsa-2021_1578
Vulnerability from csaf_redhat
Published
2021-05-18 15:49
Modified
2024-11-15 13:00
Summary
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)
* kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c (CVE-2019-18811)
* kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (CVE-2019-19523)
* kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver (CVE-2019-19528)
* kernel: possible out of bounds write in kbd_keycode of keyboard.c (CVE-2020-0431)
* kernel: DoS by corrupting mountpoint reference counter (CVE-2020-12114)
* kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c (CVE-2020-12464)
* kernel: buffer uses out of index in ext3/4 filesystem (CVE-2020-14314)
* kernel: Use After Free vulnerability in cgroup BPF component (CVE-2020-14356)
* kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c (CVE-2020-15437)
* kernel: umask not applied on filesystem without ACL support (CVE-2020-24394)
* kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212)
* kernel: incomplete permission checking for access to rbd devices (CVE-2020-25284)
* kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c (CVE-2020-25285)
* kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow (CVE-2020-25643)
* kernel: perf_event_parse_addr_filter memory (CVE-2020-25704)
* kernel: use-after-free in kernel midi subsystem (CVE-2020-27786)
* kernel: child process is able to access parent mm through hfi dev file handle (CVE-2020-27835)
* kernel: slab-out-of-bounds read in fbcon (CVE-2020-28974)
* kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent (CVE-2020-35508)
* kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations (CVE-2020-36322)
* kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege (CVE-2021-0342)
* kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c (CVE-2020-11608)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)\n\n* kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c (CVE-2019-18811)\n\n* kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (CVE-2019-19523)\n\n* kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver (CVE-2019-19528)\n\n* kernel: possible out of bounds write in kbd_keycode of keyboard.c (CVE-2020-0431)\n\n* kernel: DoS by corrupting mountpoint reference counter (CVE-2020-12114)\n\n* kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c (CVE-2020-12464)\n\n* kernel: buffer uses out of index in ext3/4 filesystem (CVE-2020-14314)\n\n* kernel: Use After Free vulnerability in cgroup BPF component (CVE-2020-14356)\n\n* kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c (CVE-2020-15437)\n\n* kernel: umask not applied on filesystem without ACL support (CVE-2020-24394)\n\n* kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212)\n\n* kernel: incomplete permission checking for access to rbd devices (CVE-2020-25284)\n\n* kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c (CVE-2020-25285)\n\n* kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow (CVE-2020-25643)\n\n* kernel: perf_event_parse_addr_filter memory (CVE-2020-25704)\n\n* kernel: use-after-free in kernel midi subsystem (CVE-2020-27786)\n\n* kernel: child process is able to access parent mm through hfi dev file handle (CVE-2020-27835)\n\n* kernel: slab-out-of-bounds read in fbcon (CVE-2020-28974)\n\n* kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent (CVE-2020-35508)\n\n* kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations (CVE-2020-36322)\n\n* kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege (CVE-2021-0342)\n\n* kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c (CVE-2020-11608)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:1578", "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/" }, { "category": "external", "summary": "1777455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777455" }, { "category": "external", "summary": "1783434", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783434" }, { "category": "external", "summary": "1783507", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783507" }, { "category": "external", "summary": "1831726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831726" }, { "category": "external", "summary": "1833445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1833445" }, { "category": "external", "summary": "1848084", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848084" }, { "category": "external", "summary": "1848652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848652" }, { "category": "external", "summary": "1853922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853922" }, { "category": "external", "summary": "1859244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1859244" }, { "category": "external", "summary": "1860479", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860479" }, { "category": "external", "summary": "1868453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868453" }, { "category": "external", "summary": "1869141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869141" }, { "category": "external", "summary": "1873759", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1873759" }, { "category": "external", "summary": "1876840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876840" }, { "category": "external", "summary": "1877575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877575" }, { "category": "external", "summary": "1879981", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879981" }, { "category": "external", "summary": "1882591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882591" }, { "category": "external", "summary": "1882594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882594" }, { "category": "external", "summary": "1890373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890373" }, { "category": "external", "summary": "1895961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895961" }, { "category": "external", "summary": "1900933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900933" }, { "category": "external", "summary": "1901161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901161" }, { "category": "external", "summary": "1901709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901709" }, { "category": "external", "summary": "1902724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902724" }, { "category": "external", "summary": "1903126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903126" }, { "category": "external", "summary": "1903387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903387" }, { "category": "external", "summary": "1903983", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903983" }, { "category": "external", "summary": "1911343", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911343" }, { "category": "external", "summary": "1915799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915799" }, { "category": "external", "summary": "1919889", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919889" }, { "category": "external", "summary": "1930246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246" }, { "category": "external", "summary": "1949560", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949560" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1578.json" } ], "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-15T13:00:52+00:00", "generator": { "date": "2024-11-15T13:00:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:1578", "initial_release_date": "2021-05-18T15:49:33+00:00", "revision_history": [ { "date": "2021-05-18T15:49:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-05-18T15:49:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T13:00:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 8)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-305.el8.aarch64", "product": { "name": "bpftool-0:4.18.0-305.el8.aarch64", "product_id": "bpftool-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-0:4.18.0-305.el8.aarch64", "product_id": "kernel-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-core-0:4.18.0-305.el8.aarch64", "product_id": "kernel-core-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-cross-headers-0:4.18.0-305.el8.aarch64", "product_id": "kernel-cross-headers-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-debug-0:4.18.0-305.el8.aarch64", "product_id": "kernel-debug-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-debug-core-0:4.18.0-305.el8.aarch64", "product_id": "kernel-debug-core-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-debug-devel-0:4.18.0-305.el8.aarch64", "product_id": "kernel-debug-devel-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-debug-modules-0:4.18.0-305.el8.aarch64", "product_id": "kernel-debug-modules-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "product_id": "kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-devel-0:4.18.0-305.el8.aarch64", "product_id": "kernel-devel-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-headers-0:4.18.0-305.el8.aarch64", "product_id": "kernel-headers-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-modules-0:4.18.0-305.el8.aarch64", "product_id": "kernel-modules-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-modules-extra-0:4.18.0-305.el8.aarch64", "product_id": "kernel-modules-extra-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-tools-0:4.18.0-305.el8.aarch64", "product_id": "kernel-tools-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-tools-libs-0:4.18.0-305.el8.aarch64", "product_id": "kernel-tools-libs-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-305.el8.aarch64", "product": { "name": "perf-0:4.18.0-305.el8.aarch64", "product_id": "perf-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-305.el8.aarch64", "product": { "name": "python3-perf-0:4.18.0-305.el8.aarch64", "product_id": "python3-perf-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "product": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "product_id": "bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "product_id": "kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-debuginfo-0:4.18.0-305.el8.aarch64", "product_id": "kernel-debuginfo-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "product_id": "kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-305.el8.aarch64", "product": { "name": "perf-debuginfo-0:4.18.0-305.el8.aarch64", "product_id": "perf-debuginfo-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "product_id": "python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "product_id": "kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-305.el8.ppc64le", "product": { "name": "bpftool-0:4.18.0-305.el8.ppc64le", "product_id": "bpftool-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-core-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-core-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-debug-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-devel-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-headers-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-modules-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-tools-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-305.el8.ppc64le", "product": { "name": "perf-0:4.18.0-305.el8.ppc64le", "product_id": "perf-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-305.el8.ppc64le", "product": { "name": "python3-perf-0:4.18.0-305.el8.ppc64le", "product_id": "python3-perf-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-305.el8.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-305.el8.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-305.el8.x86_64", "product": { "name": "bpftool-0:4.18.0-305.el8.x86_64", "product_id": "bpftool-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-0:4.18.0-305.el8.x86_64", "product_id": "kernel-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-core-0:4.18.0-305.el8.x86_64", "product_id": "kernel-core-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-305.el8.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-debug-0:4.18.0-305.el8.x86_64", "product_id": "kernel-debug-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-305.el8.x86_64", "product_id": "kernel-debug-core-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-305.el8.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-305.el8.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-devel-0:4.18.0-305.el8.x86_64", "product_id": "kernel-devel-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-headers-0:4.18.0-305.el8.x86_64", "product_id": "kernel-headers-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-modules-0:4.18.0-305.el8.x86_64", "product_id": "kernel-modules-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-305.el8.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-tools-0:4.18.0-305.el8.x86_64", "product_id": "kernel-tools-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-305.el8.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-305.el8.x86_64", "product": { "name": "perf-0:4.18.0-305.el8.x86_64", "product_id": "perf-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-305.el8.x86_64", "product": { "name": "python3-perf-0:4.18.0-305.el8.x86_64", "product_id": "python3-perf-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-305.el8.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-305.el8.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-305.el8.x86_64", "product_id": "perf-debuginfo-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "product_id": "kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-305.el8.s390x", "product": { "name": "bpftool-0:4.18.0-305.el8.s390x", "product_id": "bpftool-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-0:4.18.0-305.el8.s390x", "product_id": "kernel-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-core-0:4.18.0-305.el8.s390x", "product_id": "kernel-core-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-cross-headers-0:4.18.0-305.el8.s390x", "product_id": "kernel-cross-headers-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-debug-0:4.18.0-305.el8.s390x", "product_id": "kernel-debug-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-debug-core-0:4.18.0-305.el8.s390x", "product_id": "kernel-debug-core-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-debug-devel-0:4.18.0-305.el8.s390x", "product_id": "kernel-debug-devel-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-debug-modules-0:4.18.0-305.el8.s390x", "product_id": "kernel-debug-modules-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "product_id": "kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-devel-0:4.18.0-305.el8.s390x", "product_id": "kernel-devel-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-headers-0:4.18.0-305.el8.s390x", "product_id": "kernel-headers-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-modules-0:4.18.0-305.el8.s390x", "product_id": "kernel-modules-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-modules-extra-0:4.18.0-305.el8.s390x", "product_id": "kernel-modules-extra-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-tools-0:4.18.0-305.el8.s390x", "product_id": "kernel-tools-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-zfcpdump-0:4.18.0-305.el8.s390x", "product_id": "kernel-zfcpdump-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "product_id": "kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "product_id": "kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "product_id": "kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:4.18.0-305.el8.s390x", "product": { "name": "perf-0:4.18.0-305.el8.s390x", "product_id": "perf-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-305.el8.s390x", "product": { "name": "python3-perf-0:4.18.0-305.el8.s390x", "product_id": "python3-perf-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-305.el8.s390x", "product": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.s390x", "product_id": "bpftool-debuginfo-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "product_id": "kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-debuginfo-0:4.18.0-305.el8.s390x", "product_id": "kernel-debuginfo-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "product_id": "kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-305.el8.s390x", "product": { "name": "perf-debuginfo-0:4.18.0-305.el8.s390x", "product_id": "perf-debuginfo-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "product": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "product_id": "python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.18.0-305.el8.src", "product": { "name": "kernel-0:4.18.0-305.el8.src", "product_id": "kernel-0:4.18.0-305.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-305.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "product": { "name": "kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "product_id": "kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-305.el8?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-305.el8.noarch", "product": { "name": "kernel-doc-0:4.18.0-305.el8.noarch", "product_id": "kernel-doc-0:4.18.0-305.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-305.el8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64" }, "product_reference": "bpftool-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le" }, "product_reference": "bpftool-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x" }, "product_reference": "bpftool-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64" }, "product_reference": "bpftool-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-305.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src" }, "product_reference": "kernel-0:4.18.0-305.el8.src", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-stablelists-0:4.18.0-305.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch" }, "product_reference": "kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-core-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-core-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-core-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-devel-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-305.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch" }, "product_reference": "kernel-doc-0:4.18.0-305.el8.noarch", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-headers-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-modules-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-tools-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64" }, "product_reference": "perf-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le" }, "product_reference": "perf-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x" }, "product_reference": "perf-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64" }, "product_reference": "perf-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64" }, "product_reference": "python3-perf-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x" }, "product_reference": "python3-perf-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64" }, "product_reference": "python3-perf-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64" }, "product_reference": "bpftool-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le" }, "product_reference": "bpftool-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x" }, "product_reference": "bpftool-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64" }, "product_reference": "bpftool-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-305.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src" }, "product_reference": "kernel-0:4.18.0-305.el8.src", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-stablelists-0:4.18.0-305.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch" }, "product_reference": "kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-core-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-core-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-core-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-devel-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-305.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch" }, "product_reference": "kernel-doc-0:4.18.0-305.el8.noarch", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-headers-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-modules-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-tools-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64" }, "product_reference": "perf-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le" }, "product_reference": "perf-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x" }, "product_reference": "perf-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64" }, "product_reference": "perf-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64" }, "product_reference": "python3-perf-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x" }, "product_reference": "python3-perf-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64" }, "product_reference": "python3-perf-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-18811", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-10-28T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1777455" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s\r\nsof_set_get_large_ctrl_data function, in the way it handled memory cleanup in a specific error path. A local attacker could use this flaw to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-18811" }, { "category": "external", "summary": "RHBZ#1777455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777455" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18811", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18811" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18811", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18811" } ], "release_date": "2019-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "As the snd-sof module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install snd-sof /bin/true\" \u003e\u003e /etc/modprobe.d/disable-snd-sof.conf\n\nThe system will need to be restarted if the snd-sof module is already loaded. In most circumstances, the snd-sof kernel module will be unable to be unloaded while the device is in use. If the system requires this module to work correctly, this mitigation may not be suitable. If you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c" }, { "cve": "CVE-2019-19523", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2019-12-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1783434" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation for ADU devices from Ontrak Control Systems, where an attacker with administrative privileges and access to a local account could pre-groom the memory and physically disconnect or unload a module. The attacker must be able to access either of these two events to trigger the use-after-free, and then race the access to the use-after-free, to create a situation where key USB structs can be manipulated into corrupting memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19523" }, { "category": "external", "summary": "RHBZ#1783434", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783434" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19523", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19523" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19523", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19523" } ], "release_date": "2019-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "As the system module will be auto-loaded when a device that uses the driver is attached (via USB), its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install adutux /bin/true\" \u003e\u003e /etc/modprobe.d/disable-adutux.conf\n \nThe system will need to be restarted if the adutux module are loaded. In most circumstances, the kernel modules will be unable to be unloaded while any hardware is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver" }, { "cve": "CVE-2019-19528", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-12-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1783507" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in iowarrior_disconnect in iowarrior USB driver module were a flag was simultaneously modified causing a race between a device open and disconnect. This flaw could allow a physical attacker to cause a denial of service (DoS) attack. This vulnerability could even lead to a kernel information leak problem.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19528" }, { "category": "external", "summary": "RHBZ#1783507", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783507" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19528", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19528" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19528", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19528" } ], "release_date": "2019-10-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "This flaw can be mitigated by preventing the affected USB IO-Warrior driver (iowarrior) kernel module from loading during the boot time, ensure the module is added into the blacklist file.\n~~~\nRefer: \nHow do I blacklist a kernel module to prevent it from loading automatically? \nhttps://access.redhat.com/solutions/41278\n~~~", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver" }, { "cve": "CVE-2020-0431", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2021-01-24T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1919889" } ], "notes": [ { "category": "description", "text": "A flaw out of bounds write in the Linux kernel human interface devices subsystem was found in the way user calls find key code by index. A local user could use this flaw to crash the system or escalate privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possible out of bounds write in kbd_keycode of keyboard.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Moderate impact because in the default configuration, the issue can only be triggered by a privileged local user.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0431" }, { "category": "external", "summary": "RHBZ#1919889", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919889" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0431", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0431" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0431", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0431" }, { "category": "external", "summary": "https://patchwork.kernel.org/project/linux-input/patch/20191207210518.GA181006@dtor-ws/", "url": "https://patchwork.kernel.org/project/linux-input/patch/20191207210518.GA181006@dtor-ws/" } ], "release_date": "2021-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: possible out of bounds write in kbd_keycode of keyboard.c" }, { "cve": "CVE-2020-11608", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2020-04-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1833445" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the ov519 driver in the Linux kernel handled certain types of USB descriptors. This flaw allows an attacker with the ability to induce the error conditions to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the issue (physical access).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11608" }, { "category": "external", "summary": "RHBZ#1833445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1833445" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11608", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11608" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11608", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11608" } ], "release_date": "2020-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module gspca_ov519. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c" }, { "cve": "CVE-2020-12114", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-05-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848652" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the pivot_root syscall. This flaw allows a local privileged user (root outside or root inside a privileged container) to exploit a race condition to manipulate the reference count of the root filesystem. To be able to abuse this flaw, the process or user calling pivot_root must have advanced permissions. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: DoS by corrupting mountpoint reference counter", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12114" }, { "category": "external", "summary": "RHBZ#1848652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12114", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12114" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12114", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12114" } ], "release_date": "2020-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: DoS by corrupting mountpoint reference counter" }, { "cve": "CVE-2020-12362", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2021-02-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930246" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. An integer overflow in the firmware for some Intel(R) Graphics Drivers may allow a privileged user to potentially enable an escalation of privilege via local access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Integer overflow in Intel(R) Graphics Drivers", "title": "Vulnerability summary" }, { "category": "other", "text": "Only users that specify i915.enable_guc=-1 or i915.enable_guc=1 or 2 are open to be exploited by this issue.\n\nDue to the full fix (combination of kernel and firmware updates) being invasive and GUC firmware loading is off by default, Red Hat Enterprise Linux kernel versions prior to the Linux kernel version shipped with Red Hat Enterprise Linux 8.4 GA (kernel-4.18.0-305.el8) print a warning in the kernel log (\"GUC firmware is insecure - CVE 2020-12362 - Please update to a newer release to get secure GUC\") and do not rely on the firmware fix. As a result, Red Hat Enterprise Linux versions prior Red Hat Enterprise Linux 8.4 GA (including Red Hat Enterprise Linux 6 and 7) do not include the updated firmware packages.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12362" }, { "category": "external", "summary": "RHBZ#1930246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12362", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12362" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Integer overflow in Intel(R) Graphics Drivers" }, { "cve": "CVE-2020-12363", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930249" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. Improper input validation in some Intel(R) Graphics Drivers may allow a privileged user to potentially enable a denial of service via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Improper input validation in some Intel(R) Graphics Drivers", "title": "Vulnerability summary" }, { "category": "other", "text": "To fix this issue a combination of linux-firmware and kernel update is required to be installed on the system.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12363" }, { "category": "external", "summary": "RHBZ#1930249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930249" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12363", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12363" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12363", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12363" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Improper input validation in some Intel(R) Graphics Drivers" }, { "cve": "CVE-2020-12364", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930251" } ], "notes": [ { "category": "description", "text": "Null pointer reference in some Intel(R) Graphics Drivers for Microsoft Windows and the Linux kernel may allow a privileged user to potentially enable a denial of service via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Null pointer dereference in some Intel(R) Graphics Drivers", "title": "Vulnerability summary" }, { "category": "other", "text": "To fix this issue a combination of linux-firmware and kernel update is required to be installed on the system.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12364" }, { "category": "external", "summary": "RHBZ#1930251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930251" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12364", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12364" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12364", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12364" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Null pointer dereference in some Intel(R) Graphics Drivers" }, { "cve": "CVE-2020-12464", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-04-29T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1831726" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in usb_sg_cancel in drivers/usb/core/message.c in the USB core subsystem. This flaw allows a local attacker with a special user or root privileges to crash the system due to a race problem in the scatter-gather cancellation and transfer completion in usb_sg_wait. This vulnerability can also lead to a leak of internal kernel information.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12464" }, { "category": "external", "summary": "RHBZ#1831726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831726" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12464", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12464" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12464", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12464" } ], "release_date": "2020-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c" }, { "acknowledgments": [ { "names": [ "Jay Shin" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2020-14314", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2020-06-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853922" } ], "notes": [ { "category": "description", "text": "A memory out-of-bounds read flaw was found in the Linux kernel\u0027s ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: buffer uses out of index in ext3/4 filesystem", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14314" }, { "category": "external", "summary": "RHBZ#1853922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853922" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14314", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14314" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14314", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14314" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5872331b3d91820e14716632ebb56b1399b34fe1", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5872331b3d91820e14716632ebb56b1399b34fe1" }, { "category": "external", "summary": "https://lore.kernel.org/linux-ext4/f53e246b-647c-64bb-16ec-135383c70ad7@redhat.com/T/#u", "url": "https://lore.kernel.org/linux-ext4/f53e246b-647c-64bb-16ec-135383c70ad7@redhat.com/T/#u" } ], "release_date": "2020-06-05T16:45:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "If any directories of the partition (or image) broken, the command \"e2fsck -Df .../partition-name\" fixes it.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: buffer uses out of index in ext3/4 filesystem" }, { "acknowledgments": [ { "names": [ "Adam Zabrocki" ], "organization": "pi3.com.pl" } ], "cve": "CVE-2020-14356", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-07-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868453" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s cgroupv2 subsystem when rebooting the system. This flaw allows a local user to crash the system or escalate their privileges. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use After Free vulnerability in cgroup BPF component", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as a having Moderate impact, because only local user can trigger it and no way to trigger it before reboot happens (until user have complete privileges for accessing cgroupv2).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14356" }, { "category": "external", "summary": "RHBZ#1868453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868453" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14356", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14356" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14356", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14356" } ], "release_date": "2020-05-31T12:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Use After Free vulnerability in cgroup BPF component" }, { "acknowledgments": [ { "names": [ "Yang Yingliang" ] } ], "cve": "CVE-2020-15437", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2020-11-24T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901161" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s UART 8250 functionality, in the way certain hardware architectures handled situations where default ports (0x2E8, 0x2F8, 0x3E8, 0x3F8) are not available. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Moderate impact because the issue can only be triggered by an authorized local user in the tty or in the dialout group.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15437" }, { "category": "external", "summary": "RHBZ#1901161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15437", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15437" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15437", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15437" } ], "release_date": "2020-07-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c" }, { "cve": "CVE-2020-24394", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2020-06-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1869141" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in NFSv4.2 in the Linux kernel, where a server fails to correctly apply umask when creating a new object on filesystem without ACL support (for example, ext4 with the \"noacl\" mount option). This flaw allows a local attacker with a user privilege to cause a kernel information leak problem.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: umask not applied on filesystem without ACL support", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24394" }, { "category": "external", "summary": "RHBZ#1869141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869141" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24394", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24394" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24394", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24394" } ], "release_date": "2020-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: umask not applied on filesystem without ACL support" }, { "cve": "CVE-2020-25212", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "discovery_date": "2020-09-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1877575" } ], "notes": [ { "category": "description", "text": "A flaw was found in the NFSv4 implementation where when mounting a remote attacker controlled server it could return specially crafted response allow for local memory corruption and possibly privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TOCTOU mismatch in the NFS client code", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "RHBZ#1877575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25212", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25212" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25212", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25212" } ], "release_date": "2020-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "While there is no known mitigation to this flaw, configuring authentication and only mounting authenticated NFSv4 servers will significantly reduce the risk of this flaw being successfully exploited.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: TOCTOU mismatch in the NFS client code" }, { "cve": "CVE-2020-25284", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2020-09-25T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1882594" } ], "notes": [ { "category": "description", "text": "A flaw was found in the capabilities check of the rados block device functionality in the Linux kernel. Incorrect capability checks could alllow a local user with root priviledges (but no capabilities) to add or remove Rados Block Devices from the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: incomplete permission checking for access to rbd devices", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25284" }, { "category": "external", "summary": "RHBZ#1882594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882594" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25284", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25284" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25284", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25284" } ], "release_date": "2020-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "As the rbd module can be loaded by a priviledged user or process, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install rbd /bin/true\" \u003e\u003e /etc/modprobe.d/disable-rdb.conf \n \nThe system will need to be restarted if the modules isloaded. In most circumstances, the rbd kernel modules will be unable to be unloaded while in use.\n\nIf the system requires this module to work correctly, (Such as a CEPH node) this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: incomplete permission checking for access to rbd devices" }, { "cve": "CVE-2020-25285", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-09-25T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1882591" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernels sysctl handling code for hugepages management. When multiple root level processes would write to modify the /proc/sys/vm/nr_hugepages file it could create a race on internal variables leading to a system crash or memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Moderate impact as access to write to /proc/sys/vm/nr_hugepages is restricted to root and not available to regular users.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25285" }, { "category": "external", "summary": "RHBZ#1882591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882591" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25285", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25285" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25285", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25285" } ], "release_date": "2020-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c" }, { "acknowledgments": [ { "names": [ "ChenNan Of Chaitin" ], "organization": "Security Research Lab" } ], "cve": "CVE-2020-25643", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-09-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879981" } ], "notes": [ { "category": "description", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as a having Moderate impact, because the bug can be triggered only if PPP protocol enabled.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "RHBZ#1879981", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879981" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25643", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25643" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25643", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25643" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=66d42ed8b25b64eb63111a2b8582c5afc8bf1105", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=66d42ed8b25b64eb63111a2b8582c5afc8bf1105" } ], "release_date": "2020-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "To mitigate this issue, prevent modules hdlc_ppp, syncppp from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow" }, { "cve": "CVE-2020-25704", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2020-11-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1895961" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the Linux kernel\u2019s performance monitoring subsystem when using PERF_EVENT_IOC_SET_FILTER. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: perf_event_parse_addr_filter memory", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25704" }, { "category": "external", "summary": "RHBZ#1895961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895961" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25704", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25704" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25704", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25704" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7bdb157cdebbf95a1cd94ed2e01b338714075d00", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7bdb157cdebbf95a1cd94ed2e01b338714075d00" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2020/11/09/1", "url": "https://www.openwall.com/lists/oss-security/2020/11/09/1" } ], "release_date": "2020-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: perf_event_parse_addr_filter memory" }, { "cve": "CVE-2020-27786", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-11-24T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1900933" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in kernel midi subsystem", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27786" }, { "category": "external", "summary": "RHBZ#1900933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27786", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27786" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27786", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27786" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c1f6e3c818dd734c30f6a7eeebf232ba2cf3181d", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c1f6e3c818dd734c30f6a7eeebf232ba2cf3181d" } ], "release_date": "2020-12-02T02:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "As the midi module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install snd-rawmidi /bin/true\" \u003e\u003e /etc/modprobe.d/disable-snd-rawmidi.conf\n\nThe system will need to be restarted if the snd-rawmidi modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while any midi / sound devices are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in kernel midi subsystem" }, { "cve": "CVE-2020-27835", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-10-12T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901709" } ], "notes": [ { "category": "description", "text": "A flaw use after free in the Linux kernel infiniband hfi1 driver was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: child process is able to access parent mm through hfi dev file handle", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Moderate impact because the issue can only be triggered by an authorized local user with access to a system with specific hardware present.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27835" }, { "category": "external", "summary": "RHBZ#1901709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901709" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27835", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27835" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27835", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27835" } ], "release_date": "2020-11-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module hfi1 from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to denylist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: child process is able to access parent mm through hfi dev file handle" }, { "acknowledgments": [ { "names": [ "Yuan Ming \u003cyuanmingbuaa@gmail com\u003e" ], "organization": "Tsinghua University" } ], "cve": "CVE-2020-28974", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2020-11-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1903126" } ], "notes": [ { "category": "description", "text": "An out-of-bounds (OOB) SLAB memory access flaw was found in the Linux kernel\u0027s fbcon driver module. A bounds check failure allows a local attacker with special user privileges to gain access to out-of-bounds memory, leading to a system crash or leaking of internal kernel information. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: slab-out-of-bounds read in fbcon", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28974" }, { "category": "external", "summary": "RHBZ#1903126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903126" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28974", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28974" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28974", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28974" } ], "release_date": "2020-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Add \u0027nomodeset\u0027 option as kernel boot parameter to disable frame buffering in /etc/default/grub, and run \u0027grub2-mkconfig -o /boot/grub2/grub.cfg\u0027 and reboot.\n~~~\n# cat /proc/cmdline \nBOOT_IMAGE=(hd0,msdos1)/vmlinuz-4.18.0-147.el8.x86_64 root=/dev/mapper/rhel_rhel8u2--1-root ro crashkernel=auto resume=/dev/mapper/rhel_rhel8u2--1-swap rd.lvm.lv=rhel_rhel8u2-1/root rd.lvm.lv=rhel_rhel8u2-1/swap nomodeset\n\n# ls -l /dev/fb*\nls: cannot access \u0027/dev/fb*\u0027: No such file or directory\n~~~\n\nThe above said mitigation does not so effect for rhel6 kernel , and is only applicable for rhel7/8.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: slab-out-of-bounds read in fbcon" }, { "acknowledgments": [ { "names": [ "Eddy Wu" ], "organization": "trendmicro.com" } ], "cve": "CVE-2020-35508", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "discovery_date": "2020-11-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1902724" } ], "notes": [ { "category": "description", "text": "A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent", "title": "Vulnerability summary" }, { "category": "other", "text": "The incorrect initialization of the process id affects Red Hat Enterprise Linux only.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-35508" }, { "category": "external", "summary": "RHBZ#1902724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-35508", "url": "https://www.cve.org/CVERecord?id=CVE-2020-35508" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35508", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35508" } ], "release_date": "2020-12-09T10:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent" }, { "cve": "CVE-2020-36322", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "discovery_date": "2021-04-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1949560" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in fuse_do_getattr in fs/fuse/dir.c in the kernel side of the FUSE filesystem in the Linux kernel. A local user could use this flaw to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affected Linux kernel versions as shipped with Red Hat Enterprise Linux from 8.3 and prior the versions. RHEL 8.4 and later versions are not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36322" }, { "category": "external", "summary": "RHBZ#1949560", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949560" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36322", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36322" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36322", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36322" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d069dbe8aaf2a197142558b6fb2978189ba3454", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d069dbe8aaf2a197142558b6fb2978189ba3454" } ], "release_date": "2020-12-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "As the FUSE module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install fuse /bin/true\" \u003e\u003e /etc/modprobe.d/disable-fuse.conf\n\nThe system will need to be restarted if the FUSE modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while the FUSE filesystems are in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations" }, { "cve": "CVE-2020-36557", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-07-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2112688" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s Virtual Terminal subsystem in how a user calls the VT_DISALLOCATE ioctl during the closing/opening of ttys. This flaw allows a local user to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: race condition between the VT_DISALLOCATE ioctl and closing/opening of ttys, causing a use-after-free in con_shutdown().", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36557" }, { "category": "external", "summary": "RHBZ#2112688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2112688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36557", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36557" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36557", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36557" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ca4463bf8438b403596edd0ec961ca0d4fbe0220", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ca4463bf8438b403596edd0ec961ca0d4fbe0220" } ], "release_date": "2020-03-21T10:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: race condition between the VT_DISALLOCATE ioctl and closing/opening of ttys, causing a use-after-free in con_shutdown()." }, { "cve": "CVE-2020-36694", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-12-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2212140" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the packet processing context in net/netfilter/x_tables.c in netfilter in the Linux Kernel. This issue occurs when the per-CPU sequence count is mishandled during concurrent iptables rules replacement and can be exploited with the CAP_NET_ADMIN capability in an unprivileged namespace.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: netfilter: use-after-free in the packet processing context", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36694" }, { "category": "external", "summary": "RHBZ#2212140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2212140" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36694", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36694" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36694", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36694" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc00bcaa589914096edef7fb87ca5cee4a166b5c", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc00bcaa589914096edef7fb87ca5cee4a166b5c" } ], "release_date": "2023-05-22T06:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: netfilter: use-after-free in the packet processing context" }, { "cve": "CVE-2021-0342", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-13T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1915799" } ], "notes": [ { "category": "description", "text": "A flaw use after free in the Linux kernel TUN/TAP device driver functionality was found in the way user create and use tun/tap device. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Moderate impact because of the need to have elevated privileges and non-standard configuration of the networking device.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-0342" }, { "category": "external", "summary": "RHBZ#1915799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915799" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-0342", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0342" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0342", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0342" }, { "category": "external", "summary": "https://lore.kernel.org/netdev/20200608230607.3361041-84-sashal@kernel.org/", "url": "https://lore.kernel.org/netdev/20200608230607.3361041-84-sashal@kernel.org/" } ], "release_date": "2021-01-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module tun from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege" }, { "cve": "CVE-2021-0605", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-06-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1974823" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u0027s pfkey_dump function trusted the provided filter size parameters. A local, sufficiently privileged user could use this flaw to leak information from the kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: In pfkey_dump() dplen and splen can both be specified to access the xfrm_address_t structure out of bounds", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-0605" }, { "category": "external", "summary": "RHBZ#1974823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974823" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-0605", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0605" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0605", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0605" } ], "release_date": "2021-06-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "If the CAP_NET_ADMIN capability is privileged by default (which is true for Red Hat Enterprise Linux 7), then only an otherwise privileged user can trigger this bug. \n\nOn Red Hat Enterprise Linux 8 CAP_NET_ADMIN capability can be also gained by exploiting unprivileged user namespaces. The mitigation is to disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: In pfkey_dump() dplen and splen can both be specified to access the xfrm_address_t structure out of bounds" }, { "cve": "CVE-2021-3428", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2021-01-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1936786" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A denial of service problem is identified if an extent tree is corrupted in a crafted ext4 filesystem in fs/ext4/extents.c in ext4_es_cache_extent. Fabricating an integer overflow, A local attacker with a special user privilege may cause a system crash problem which can lead to an availability threat.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: integer overflow in ext4_es_cache_extent", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3428" }, { "category": "external", "summary": "RHBZ#1936786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1936786" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3428", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3428" } ], "release_date": "2021-01-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: integer overflow in ext4_es_cache_extent" }, { "acknowledgments": [ { "names": [ "Remy" ], "organization": "GreyNoiseIO" } ], "cve": "CVE-2023-1390", "cwe": { "id": "CWE-1050", "name": "Excessive Platform Resource Consumption within a Loop" }, "discovery_date": "2022-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2178212" } ], "notes": [ { "category": "description", "text": "A remote denial of service vulnerability was found in the Linux kernel\u2019s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: remote DoS in TIPC kernel module", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6 and 7 are not affected by this issue as they did not include the affected code in `tipc_link_xmit`, introduced in upstream kernel version 4.3 (commit af9b028 \"tipc: make media xmit call outside node spinlock context\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "RHBZ#2178212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1390", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390" }, { "category": "external", "summary": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5", "url": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5" }, { "category": "external", "summary": "https://infosec.exchange/@_mattata/109427999461122360", "url": "https://infosec.exchange/@_mattata/109427999461122360" } ], "release_date": "2021-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: remote DoS in TIPC kernel module" } ] }
rhsa-2023_4125
Vulnerability from csaf_redhat
Published
2023-07-18 07:48
Modified
2024-11-15 17:22
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)
* kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation (CVE-2023-1281)
* kernel: remote DoS in TIPC kernel module (CVE-2023-1390)
* kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* RHEL8.1 Snapshot3 - PVT:940:virt:4TB:LPM operation failed by returning HSCLA2CF, HSCL365C SRC's - Linux partition suspend timeout (-> documentation/Linux Alert through LTC bug 182549) (BZ#2151218)
* i40e: Set RX_ONLY mode for unicast promiscuous on VLAN (BZ#2171382)
* Invalid character detected by rpminspect in Documentation/translations/zh_CN/process/magic-number.rst (BZ#2208288)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)\n\n* kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation (CVE-2023-1281)\n\n* kernel: remote DoS in TIPC kernel module (CVE-2023-1390)\n\n* kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* RHEL8.1 Snapshot3 - PVT:940:virt:4TB:LPM operation failed by returning HSCLA2CF, HSCL365C SRC\u0027s - Linux partition suspend timeout (-\u003e documentation/Linux Alert through LTC bug 182549) (BZ#2151218)\n\n* i40e: Set RX_ONLY mode for unicast promiscuous on VLAN (BZ#2171382)\n\n* Invalid character detected by rpminspect in Documentation/translations/zh_CN/process/magic-number.rst (BZ#2208288)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:4125", "url": "https://access.redhat.com/errata/RHSA-2023:4125" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2176192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176192" }, { "category": "external", "summary": "2178212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178212" }, { "category": "external", "summary": "2181847", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2181847" }, { "category": "external", "summary": "2196105", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196105" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_4125.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-15T17:22:01+00:00", "generator": { "date": "2024-11-15T17:22:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2023:4125", "initial_release_date": "2023-07-18T07:48:59+00:00", "revision_history": [ { "date": "2023-07-18T07:48:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-07-18T07:48:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T17:22:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:8.2::baseos" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:8.2::baseos" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:8.2::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "perf-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "perf-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.109.1.el8_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.18.0-193.109.1.el8_2.src", "product": { "name": "kernel-0:4.18.0-193.109.1.el8_2.src", "product_id": "kernel-0:4.18.0-193.109.1.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.109.1.el8_2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "product": { "name": "kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "product_id": "kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.109.1.el8_2?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "product": { "name": "kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "product_id": "kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.109.1.el8_2?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "perf-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "perf-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.109.1.el8_2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.109.1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.src" }, "product_reference": "kernel-0:4.18.0-193.109.1.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-193.109.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch" }, "product_reference": "kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "perf-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.109.1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.src" }, "product_reference": "kernel-0:4.18.0-193.109.1.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-193.109.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch" }, "product_reference": "kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "perf-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "perf-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.109.1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.src" }, "product_reference": "kernel-0:4.18.0-193.109.1.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-193.109.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch" }, "product_reference": "kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:perf-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "perf-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-0461", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-02-23T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.2.0.Z.AUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2176192" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net/ulp: use-after-free in listening ULP sockets", "title": "Vulnerability summary" }, { "category": "other", "text": "Versions of Red Hat Enterprise Linux before 8 are not affected by this vulnerability as they did not include the upstream commit 734942c (\"tcp: ULP infrastructure\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" ], "known_not_affected": [ "BaseOS-8.2.0.Z.AUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-0461" }, { "category": "external", "summary": "RHBZ#2176192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176192" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0461", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0461" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461" }, { "category": "external", "summary": "https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c", "url": "https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c" } ], "release_date": "2023-02-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T07:48:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2023:4125" }, { "category": "workaround", "details": "To mitigate this issue, prevent module tls from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: net/ulp: use-after-free in listening ULP sockets" }, { "cve": "CVE-2023-1281", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-03-26T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.2.0.Z.AUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2181847" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The imperfect hash area can be updated while packets are traversing. This issue could allow a local attacker to cause a use-after-free problem, leading to privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation", "title": "Vulnerability summary" }, { "category": "other", "text": "For the Red Hat Enterprise Linux 7, please use mitigation to disable module cls_tcindex, because some other bugs exists in the Linux Kernel traffic control index filter too that not going to be fixed before Red Hat Enterprise Linux 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" ], "known_not_affected": [ "BaseOS-8.2.0.Z.AUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-1281" }, { "category": "external", "summary": "RHBZ#2181847", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2181847" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1281", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1281" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1281", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1281" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2" } ], "release_date": "2023-02-23T06:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T07:48:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2023:4125" }, { "category": "workaround", "details": "This flaw can be mitigated by preventing the affected traffic control index filter (cls_tcindex) kernel module from loading during the boot time, ensure the module is added into the blacklist file.\n~~~\nRefer: \nHow do I blacklist a kernel module to prevent it from loading automatically? \nhttps://access.redhat.com/solutions/41278\n~~~", "product_ids": [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation" }, { "acknowledgments": [ { "names": [ "Remy" ], "organization": "GreyNoiseIO" } ], "cve": "CVE-2023-1390", "cwe": { "id": "CWE-1050", "name": "Excessive Platform Resource Consumption within a Loop" }, "discovery_date": "2022-11-30T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.2.0.Z.AUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2178212" } ], "notes": [ { "category": "description", "text": "A remote denial of service vulnerability was found in the Linux kernel\u2019s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: remote DoS in TIPC kernel module", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6 and 7 are not affected by this issue as they did not include the affected code in `tipc_link_xmit`, introduced in upstream kernel version 4.3 (commit af9b028 \"tipc: make media xmit call outside node spinlock context\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" ], "known_not_affected": [ "BaseOS-8.2.0.Z.AUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "RHBZ#2178212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1390", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390" }, { "category": "external", "summary": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5", "url": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5" }, { "category": "external", "summary": "https://infosec.exchange/@_mattata/109427999461122360", "url": "https://infosec.exchange/@_mattata/109427999461122360" } ], "release_date": "2021-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T07:48:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2023:4125" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: remote DoS in TIPC kernel module" }, { "acknowledgments": [ { "names": [ "Patryk Sondej", "Piotr Krysiuk" ] } ], "cve": "CVE-2023-32233", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-05-08T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.2.0.Z.AUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2196105" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the Netfilter subsystem of the Linux kernel when processing batch requests to update nf_tables configuration. This vulnerability can be abused to perform arbitrary reads and writes in kernel memory. A local user (with CAP_NET_ADMIN capability) could use this flaw to crash the system or potentially escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation", "title": "Vulnerability summary" }, { "category": "other", "text": "Only local users with `CAP_NET_ADMIN` capability (or root) can trigger this issue. \nOn Red Hat Enterprise Linux, local unprivileged users can exploit unprivileged user namespaces (CONFIG_USER_NS) to grant themselves this capability.\n\nThe OpenShift Container Platform (OCP) control planes or master machines are based on Red Hat Enterprise Linux CoreOS (RHCOS) that consists primarily of RHEL components, hence is also affected by this kernel vulnerability. Like it is mentioned earlier, the successful exploit needs necessary privileges (CAP_NET_ADMIN) and direct, local access . Local user in RHCOS is already a root with full permissions, hence existence of this vulnerability does not bring any value from the potential attacker perspective. From the OpenShift containers perspective, this vulnerability cannot be exploited as in OpenShift the cluster processes on the node are namespaced, which means that switching in the running OpenShift container the namespace will not bring necessary capabilities.\nThis means that for OpenShift, the impact of this vulnerability is Low.\nSimilar to CVE-2023-32233 vulnerability has been explained in the following blog post as an example of \"Container escape vulnerability\":\nhttps://www.redhat.com/en/blog/containers-vulnerability-risk-assessment", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" ], "known_not_affected": [ "BaseOS-8.2.0.Z.AUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32233" }, { "category": "external", "summary": "RHBZ#2196105", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196105" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32233", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32233" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32233", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32233" }, { "category": "external", "summary": "https://github.com/torvalds/linux/commit/c1592a89942e9678f7d9c8030efa777c0d57edab", "url": "https://github.com/torvalds/linux/commit/c1592a89942e9678f7d9c8030efa777c0d57edab" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2023/05/08/4", "url": "https://www.openwall.com/lists/oss-security/2023/05/08/4" } ], "release_date": "2023-05-02T04:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T07:48:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2023:4125" }, { "category": "workaround", "details": "1. This flaw can be mitigated by preventing the affected netfilter (nf_tables) kernel module from being loaded. For instructions on how to blacklist a kernel module, please see https://access.redhat.com/solutions/41278.\n\n2. If the module cannot be disabled, on non-containerized deployments of Red Hat Enterprise Linux, the mitigation is to disable user namespaces:\n```\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n```\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use the second mitigation (disabling user namespaces) as the functionality is needed to be enabled. The first mitigation (blacklisting nf_tables) is still viable for containerized deployments, providing the environment is not using netfilter.", "product_ids": [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation" } ] }
rhsa-2021_1739
Vulnerability from csaf_redhat
Published
2021-05-18 16:07
Modified
2024-11-15 13:01
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)
* kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (CVE-2019-19523)
* kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver (CVE-2019-19528)
* kernel: possible out of bounds write in kbd_keycode of keyboard.c (CVE-2020-0431)
* kernel: DoS by corrupting mountpoint reference counter (CVE-2020-12114)
* kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c (CVE-2020-12464)
* kernel: buffer uses out of index in ext3/4 filesystem (CVE-2020-14314)
* kernel: Use After Free vulnerability in cgroup BPF component (CVE-2020-14356)
* kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c (CVE-2020-15437)
* kernel: umask not applied on filesystem without ACL support (CVE-2020-24394)
* kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212)
* kernel: incomplete permission checking for access to rbd devices (CVE-2020-25284)
* kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c (CVE-2020-25285)
* kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow (CVE-2020-25643)
* kernel: perf_event_parse_addr_filter memory (CVE-2020-25704)
* kernel: use-after-free in kernel midi subsystem (CVE-2020-27786)
* kernel: child process is able to access parent mm through hfi dev file handle (CVE-2020-27835)
* kernel: slab-out-of-bounds read in fbcon (CVE-2020-28974)
* kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent (CVE-2020-35508)
* kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege (CVE-2021-0342)
* kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c (CVE-2020-11608)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)\n\n* kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (CVE-2019-19523)\n\n* kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver (CVE-2019-19528)\n\n* kernel: possible out of bounds write in kbd_keycode of keyboard.c (CVE-2020-0431)\n\n* kernel: DoS by corrupting mountpoint reference counter (CVE-2020-12114)\n\n* kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c (CVE-2020-12464)\n\n* kernel: buffer uses out of index in ext3/4 filesystem (CVE-2020-14314)\n\n* kernel: Use After Free vulnerability in cgroup BPF component (CVE-2020-14356)\n\n* kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c (CVE-2020-15437)\n\n* kernel: umask not applied on filesystem without ACL support (CVE-2020-24394)\n\n* kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212)\n\n* kernel: incomplete permission checking for access to rbd devices (CVE-2020-25284)\n\n* kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c (CVE-2020-25285)\n\n* kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow (CVE-2020-25643)\n\n* kernel: perf_event_parse_addr_filter memory (CVE-2020-25704)\n\n* kernel: use-after-free in kernel midi subsystem (CVE-2020-27786)\n\n* kernel: child process is able to access parent mm through hfi dev file handle (CVE-2020-27835)\n\n* kernel: slab-out-of-bounds read in fbcon (CVE-2020-28974)\n\n* kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent (CVE-2020-35508)\n\n* kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege (CVE-2021-0342)\n\n* kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c (CVE-2020-11608)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:1739", "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/" }, { "category": "external", "summary": "1783434", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783434" }, { "category": "external", "summary": "1783507", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783507" }, { "category": "external", "summary": "1831726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831726" }, { "category": "external", "summary": "1833445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1833445" }, { "category": "external", "summary": "1848652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848652" }, { "category": "external", "summary": "1853922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853922" }, { "category": "external", "summary": "1868453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868453" }, { "category": "external", "summary": "1869141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869141" }, { "category": "external", "summary": "1877575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877575" }, { "category": "external", "summary": "1879981", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879981" }, { "category": "external", "summary": "1882591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882591" }, { "category": "external", "summary": "1882594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882594" }, { "category": "external", "summary": "1886109", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886109" }, { "category": "external", "summary": "1894793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894793" }, { "category": "external", "summary": "1895961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895961" }, { "category": "external", "summary": "1896842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1896842" }, { "category": "external", "summary": "1897869", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897869" }, { "category": "external", "summary": "1900933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900933" }, { "category": "external", "summary": "1901161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901161" }, { "category": "external", "summary": "1901709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901709" }, { "category": "external", "summary": "1902724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902724" }, { "category": "external", "summary": "1903126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903126" }, { "category": "external", "summary": "1915799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915799" }, { "category": "external", "summary": "1919889", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919889" }, { "category": "external", "summary": "1930246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1739.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2024-11-15T13:01:01+00:00", "generator": { "date": "2024-11-15T13:01:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:1739", "initial_release_date": "2021-05-18T16:07:21+00:00", "revision_history": [ { "date": "2021-05-18T16:07:21+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-05-18T16:07:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T13:01:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product": { "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::nfv" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time (v. 8)", "product": { "name": "Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::realtime" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-305.rt7.72.el8.src", "product": { "name": "kernel-rt-0:4.18.0-305.rt7.72.el8.src", "product_id": "kernel-rt-0:4.18.0-305.rt7.72.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.rt7.72.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-305.rt7.72.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-305.rt7.72.el8.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src" }, "product_reference": "kernel-rt-0:4.18.0-305.rt7.72.el8.src", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-305.rt7.72.el8.src as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src" }, "product_reference": "kernel-rt-0:4.18.0-305.rt7.72.el8.src", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19523", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2019-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1783434" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation for ADU devices from Ontrak Control Systems, where an attacker with administrative privileges and access to a local account could pre-groom the memory and physically disconnect or unload a module. The attacker must be able to access either of these two events to trigger the use-after-free, and then race the access to the use-after-free, to create a situation where key USB structs can be manipulated into corrupting memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19523" }, { "category": "external", "summary": "RHBZ#1783434", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783434" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19523", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19523" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19523", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19523" } ], "release_date": "2019-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "As the system module will be auto-loaded when a device that uses the driver is attached (via USB), its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install adutux /bin/true\" \u003e\u003e /etc/modprobe.d/disable-adutux.conf\n \nThe system will need to be restarted if the adutux module are loaded. In most circumstances, the kernel modules will be unable to be unloaded while any hardware is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver" }, { "cve": "CVE-2019-19528", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-12-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1783507" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in iowarrior_disconnect in iowarrior USB driver module were a flag was simultaneously modified causing a race between a device open and disconnect. This flaw could allow a physical attacker to cause a denial of service (DoS) attack. This vulnerability could even lead to a kernel information leak problem.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19528" }, { "category": "external", "summary": "RHBZ#1783507", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783507" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19528", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19528" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19528", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19528" } ], "release_date": "2019-10-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "This flaw can be mitigated by preventing the affected USB IO-Warrior driver (iowarrior) kernel module from loading during the boot time, ensure the module is added into the blacklist file.\n~~~\nRefer: \nHow do I blacklist a kernel module to prevent it from loading automatically? \nhttps://access.redhat.com/solutions/41278\n~~~", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver" }, { "cve": "CVE-2020-0431", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2021-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1919889" } ], "notes": [ { "category": "description", "text": "A flaw out of bounds write in the Linux kernel human interface devices subsystem was found in the way user calls find key code by index. A local user could use this flaw to crash the system or escalate privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possible out of bounds write in kbd_keycode of keyboard.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Moderate impact because in the default configuration, the issue can only be triggered by a privileged local user.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0431" }, { "category": "external", "summary": "RHBZ#1919889", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919889" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0431", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0431" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0431", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0431" }, { "category": "external", "summary": "https://patchwork.kernel.org/project/linux-input/patch/20191207210518.GA181006@dtor-ws/", "url": "https://patchwork.kernel.org/project/linux-input/patch/20191207210518.GA181006@dtor-ws/" } ], "release_date": "2021-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: possible out of bounds write in kbd_keycode of keyboard.c" }, { "cve": "CVE-2020-11608", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2020-04-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1833445" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the ov519 driver in the Linux kernel handled certain types of USB descriptors. This flaw allows an attacker with the ability to induce the error conditions to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the issue (physical access).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11608" }, { "category": "external", "summary": "RHBZ#1833445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1833445" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11608", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11608" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11608", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11608" } ], "release_date": "2020-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module gspca_ov519. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c" }, { "cve": "CVE-2020-12114", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848652" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the pivot_root syscall. This flaw allows a local privileged user (root outside or root inside a privileged container) to exploit a race condition to manipulate the reference count of the root filesystem. To be able to abuse this flaw, the process or user calling pivot_root must have advanced permissions. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: DoS by corrupting mountpoint reference counter", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12114" }, { "category": "external", "summary": "RHBZ#1848652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12114", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12114" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12114", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12114" } ], "release_date": "2020-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: DoS by corrupting mountpoint reference counter" }, { "cve": "CVE-2020-12362", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930246" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. An integer overflow in the firmware for some Intel(R) Graphics Drivers may allow a privileged user to potentially enable an escalation of privilege via local access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Integer overflow in Intel(R) Graphics Drivers", "title": "Vulnerability summary" }, { "category": "other", "text": "Only users that specify i915.enable_guc=-1 or i915.enable_guc=1 or 2 are open to be exploited by this issue.\n\nDue to the full fix (combination of kernel and firmware updates) being invasive and GUC firmware loading is off by default, Red Hat Enterprise Linux kernel versions prior to the Linux kernel version shipped with Red Hat Enterprise Linux 8.4 GA (kernel-4.18.0-305.el8) print a warning in the kernel log (\"GUC firmware is insecure - CVE 2020-12362 - Please update to a newer release to get secure GUC\") and do not rely on the firmware fix. As a result, Red Hat Enterprise Linux versions prior Red Hat Enterprise Linux 8.4 GA (including Red Hat Enterprise Linux 6 and 7) do not include the updated firmware packages.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12362" }, { "category": "external", "summary": "RHBZ#1930246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12362", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12362" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Integer overflow in Intel(R) Graphics Drivers" }, { "cve": "CVE-2020-12363", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930249" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. Improper input validation in some Intel(R) Graphics Drivers may allow a privileged user to potentially enable a denial of service via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Improper input validation in some Intel(R) Graphics Drivers", "title": "Vulnerability summary" }, { "category": "other", "text": "To fix this issue a combination of linux-firmware and kernel update is required to be installed on the system.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12363" }, { "category": "external", "summary": "RHBZ#1930249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930249" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12363", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12363" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12363", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12363" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Improper input validation in some Intel(R) Graphics Drivers" }, { "cve": "CVE-2020-12364", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930251" } ], "notes": [ { "category": "description", "text": "Null pointer reference in some Intel(R) Graphics Drivers for Microsoft Windows and the Linux kernel may allow a privileged user to potentially enable a denial of service via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Null pointer dereference in some Intel(R) Graphics Drivers", "title": "Vulnerability summary" }, { "category": "other", "text": "To fix this issue a combination of linux-firmware and kernel update is required to be installed on the system.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12364" }, { "category": "external", "summary": "RHBZ#1930251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930251" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12364", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12364" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12364", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12364" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Null pointer dereference in some Intel(R) Graphics Drivers" }, { "cve": "CVE-2020-12464", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-04-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1831726" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in usb_sg_cancel in drivers/usb/core/message.c in the USB core subsystem. This flaw allows a local attacker with a special user or root privileges to crash the system due to a race problem in the scatter-gather cancellation and transfer completion in usb_sg_wait. This vulnerability can also lead to a leak of internal kernel information.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12464" }, { "category": "external", "summary": "RHBZ#1831726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831726" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12464", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12464" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12464", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12464" } ], "release_date": "2020-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c" }, { "acknowledgments": [ { "names": [ "Jay Shin" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2020-14314", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2020-06-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853922" } ], "notes": [ { "category": "description", "text": "A memory out-of-bounds read flaw was found in the Linux kernel\u0027s ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: buffer uses out of index in ext3/4 filesystem", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14314" }, { "category": "external", "summary": "RHBZ#1853922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853922" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14314", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14314" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14314", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14314" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5872331b3d91820e14716632ebb56b1399b34fe1", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5872331b3d91820e14716632ebb56b1399b34fe1" }, { "category": "external", "summary": "https://lore.kernel.org/linux-ext4/f53e246b-647c-64bb-16ec-135383c70ad7@redhat.com/T/#u", "url": "https://lore.kernel.org/linux-ext4/f53e246b-647c-64bb-16ec-135383c70ad7@redhat.com/T/#u" } ], "release_date": "2020-06-05T16:45:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "If any directories of the partition (or image) broken, the command \"e2fsck -Df .../partition-name\" fixes it.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: buffer uses out of index in ext3/4 filesystem" }, { "acknowledgments": [ { "names": [ "Adam Zabrocki" ], "organization": "pi3.com.pl" } ], "cve": "CVE-2020-14356", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-07-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868453" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s cgroupv2 subsystem when rebooting the system. This flaw allows a local user to crash the system or escalate their privileges. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use After Free vulnerability in cgroup BPF component", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as a having Moderate impact, because only local user can trigger it and no way to trigger it before reboot happens (until user have complete privileges for accessing cgroupv2).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14356" }, { "category": "external", "summary": "RHBZ#1868453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868453" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14356", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14356" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14356", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14356" } ], "release_date": "2020-05-31T12:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Use After Free vulnerability in cgroup BPF component" }, { "acknowledgments": [ { "names": [ "Yang Yingliang" ] } ], "cve": "CVE-2020-15437", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2020-11-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901161" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s UART 8250 functionality, in the way certain hardware architectures handled situations where default ports (0x2E8, 0x2F8, 0x3E8, 0x3F8) are not available. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Moderate impact because the issue can only be triggered by an authorized local user in the tty or in the dialout group.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15437" }, { "category": "external", "summary": "RHBZ#1901161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15437", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15437" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15437", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15437" } ], "release_date": "2020-07-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c" }, { "cve": "CVE-2020-24394", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2020-06-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1869141" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in NFSv4.2 in the Linux kernel, where a server fails to correctly apply umask when creating a new object on filesystem without ACL support (for example, ext4 with the \"noacl\" mount option). This flaw allows a local attacker with a user privilege to cause a kernel information leak problem.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: umask not applied on filesystem without ACL support", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24394" }, { "category": "external", "summary": "RHBZ#1869141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869141" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24394", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24394" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24394", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24394" } ], "release_date": "2020-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: umask not applied on filesystem without ACL support" }, { "cve": "CVE-2020-25212", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "discovery_date": "2020-09-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1877575" } ], "notes": [ { "category": "description", "text": "A flaw was found in the NFSv4 implementation where when mounting a remote attacker controlled server it could return specially crafted response allow for local memory corruption and possibly privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TOCTOU mismatch in the NFS client code", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "RHBZ#1877575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25212", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25212" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25212", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25212" } ], "release_date": "2020-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "While there is no known mitigation to this flaw, configuring authentication and only mounting authenticated NFSv4 servers will significantly reduce the risk of this flaw being successfully exploited.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: TOCTOU mismatch in the NFS client code" }, { "cve": "CVE-2020-25284", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2020-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1882594" } ], "notes": [ { "category": "description", "text": "A flaw was found in the capabilities check of the rados block device functionality in the Linux kernel. Incorrect capability checks could alllow a local user with root priviledges (but no capabilities) to add or remove Rados Block Devices from the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: incomplete permission checking for access to rbd devices", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25284" }, { "category": "external", "summary": "RHBZ#1882594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882594" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25284", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25284" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25284", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25284" } ], "release_date": "2020-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "As the rbd module can be loaded by a priviledged user or process, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install rbd /bin/true\" \u003e\u003e /etc/modprobe.d/disable-rdb.conf \n \nThe system will need to be restarted if the modules isloaded. In most circumstances, the rbd kernel modules will be unable to be unloaded while in use.\n\nIf the system requires this module to work correctly, (Such as a CEPH node) this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: incomplete permission checking for access to rbd devices" }, { "cve": "CVE-2020-25285", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1882591" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernels sysctl handling code for hugepages management. When multiple root level processes would write to modify the /proc/sys/vm/nr_hugepages file it could create a race on internal variables leading to a system crash or memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Moderate impact as access to write to /proc/sys/vm/nr_hugepages is restricted to root and not available to regular users.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25285" }, { "category": "external", "summary": "RHBZ#1882591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882591" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25285", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25285" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25285", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25285" } ], "release_date": "2020-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c" }, { "acknowledgments": [ { "names": [ "ChenNan Of Chaitin" ], "organization": "Security Research Lab" } ], "cve": "CVE-2020-25643", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-09-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879981" } ], "notes": [ { "category": "description", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as a having Moderate impact, because the bug can be triggered only if PPP protocol enabled.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "RHBZ#1879981", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879981" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25643", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25643" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25643", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25643" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=66d42ed8b25b64eb63111a2b8582c5afc8bf1105", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=66d42ed8b25b64eb63111a2b8582c5afc8bf1105" } ], "release_date": "2020-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "To mitigate this issue, prevent modules hdlc_ppp, syncppp from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow" }, { "cve": "CVE-2020-25704", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2020-11-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1895961" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the Linux kernel\u2019s performance monitoring subsystem when using PERF_EVENT_IOC_SET_FILTER. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: perf_event_parse_addr_filter memory", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25704" }, { "category": "external", "summary": "RHBZ#1895961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895961" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25704", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25704" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25704", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25704" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7bdb157cdebbf95a1cd94ed2e01b338714075d00", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7bdb157cdebbf95a1cd94ed2e01b338714075d00" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2020/11/09/1", "url": "https://www.openwall.com/lists/oss-security/2020/11/09/1" } ], "release_date": "2020-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: perf_event_parse_addr_filter memory" }, { "cve": "CVE-2020-27786", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-11-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1900933" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in kernel midi subsystem", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27786" }, { "category": "external", "summary": "RHBZ#1900933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27786", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27786" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27786", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27786" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c1f6e3c818dd734c30f6a7eeebf232ba2cf3181d", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c1f6e3c818dd734c30f6a7eeebf232ba2cf3181d" } ], "release_date": "2020-12-02T02:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "As the midi module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install snd-rawmidi /bin/true\" \u003e\u003e /etc/modprobe.d/disable-snd-rawmidi.conf\n\nThe system will need to be restarted if the snd-rawmidi modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while any midi / sound devices are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in kernel midi subsystem" }, { "cve": "CVE-2020-27835", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901709" } ], "notes": [ { "category": "description", "text": "A flaw use after free in the Linux kernel infiniband hfi1 driver was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: child process is able to access parent mm through hfi dev file handle", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Moderate impact because the issue can only be triggered by an authorized local user with access to a system with specific hardware present.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27835" }, { "category": "external", "summary": "RHBZ#1901709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901709" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27835", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27835" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27835", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27835" } ], "release_date": "2020-11-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module hfi1 from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to denylist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: child process is able to access parent mm through hfi dev file handle" }, { "acknowledgments": [ { "names": [ "Yuan Ming \u003cyuanmingbuaa@gmail com\u003e" ], "organization": "Tsinghua University" } ], "cve": "CVE-2020-28974", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2020-11-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1903126" } ], "notes": [ { "category": "description", "text": "An out-of-bounds (OOB) SLAB memory access flaw was found in the Linux kernel\u0027s fbcon driver module. A bounds check failure allows a local attacker with special user privileges to gain access to out-of-bounds memory, leading to a system crash or leaking of internal kernel information. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: slab-out-of-bounds read in fbcon", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28974" }, { "category": "external", "summary": "RHBZ#1903126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903126" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28974", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28974" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28974", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28974" } ], "release_date": "2020-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Add \u0027nomodeset\u0027 option as kernel boot parameter to disable frame buffering in /etc/default/grub, and run \u0027grub2-mkconfig -o /boot/grub2/grub.cfg\u0027 and reboot.\n~~~\n# cat /proc/cmdline \nBOOT_IMAGE=(hd0,msdos1)/vmlinuz-4.18.0-147.el8.x86_64 root=/dev/mapper/rhel_rhel8u2--1-root ro crashkernel=auto resume=/dev/mapper/rhel_rhel8u2--1-swap rd.lvm.lv=rhel_rhel8u2-1/root rd.lvm.lv=rhel_rhel8u2-1/swap nomodeset\n\n# ls -l /dev/fb*\nls: cannot access \u0027/dev/fb*\u0027: No such file or directory\n~~~\n\nThe above said mitigation does not so effect for rhel6 kernel , and is only applicable for rhel7/8.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: slab-out-of-bounds read in fbcon" }, { "acknowledgments": [ { "names": [ "Eddy Wu" ], "organization": "trendmicro.com" } ], "cve": "CVE-2020-35508", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "discovery_date": "2020-11-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1902724" } ], "notes": [ { "category": "description", "text": "A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent", "title": "Vulnerability summary" }, { "category": "other", "text": "The incorrect initialization of the process id affects Red Hat Enterprise Linux only.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-35508" }, { "category": "external", "summary": "RHBZ#1902724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-35508", "url": "https://www.cve.org/CVERecord?id=CVE-2020-35508" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35508", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35508" } ], "release_date": "2020-12-09T10:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent" }, { "cve": "CVE-2020-36694", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-12-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2212140" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the packet processing context in net/netfilter/x_tables.c in netfilter in the Linux Kernel. This issue occurs when the per-CPU sequence count is mishandled during concurrent iptables rules replacement and can be exploited with the CAP_NET_ADMIN capability in an unprivileged namespace.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: netfilter: use-after-free in the packet processing context", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36694" }, { "category": "external", "summary": "RHBZ#2212140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2212140" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36694", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36694" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36694", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36694" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc00bcaa589914096edef7fb87ca5cee4a166b5c", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc00bcaa589914096edef7fb87ca5cee4a166b5c" } ], "release_date": "2023-05-22T06:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: netfilter: use-after-free in the packet processing context" }, { "cve": "CVE-2021-0342", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1915799" } ], "notes": [ { "category": "description", "text": "A flaw use after free in the Linux kernel TUN/TAP device driver functionality was found in the way user create and use tun/tap device. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Moderate impact because of the need to have elevated privileges and non-standard configuration of the networking device.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-0342" }, { "category": "external", "summary": "RHBZ#1915799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915799" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-0342", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0342" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0342", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0342" }, { "category": "external", "summary": "https://lore.kernel.org/netdev/20200608230607.3361041-84-sashal@kernel.org/", "url": "https://lore.kernel.org/netdev/20200608230607.3361041-84-sashal@kernel.org/" } ], "release_date": "2021-01-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module tun from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege" }, { "cve": "CVE-2021-0605", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-06-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1974823" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u0027s pfkey_dump function trusted the provided filter size parameters. A local, sufficiently privileged user could use this flaw to leak information from the kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: In pfkey_dump() dplen and splen can both be specified to access the xfrm_address_t structure out of bounds", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-0605" }, { "category": "external", "summary": "RHBZ#1974823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974823" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-0605", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0605" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0605", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0605" } ], "release_date": "2021-06-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "If the CAP_NET_ADMIN capability is privileged by default (which is true for Red Hat Enterprise Linux 7), then only an otherwise privileged user can trigger this bug. \n\nOn Red Hat Enterprise Linux 8 CAP_NET_ADMIN capability can be also gained by exploiting unprivileged user namespaces. The mitigation is to disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: In pfkey_dump() dplen and splen can both be specified to access the xfrm_address_t structure out of bounds" }, { "cve": "CVE-2021-3428", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2021-01-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1936786" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A denial of service problem is identified if an extent tree is corrupted in a crafted ext4 filesystem in fs/ext4/extents.c in ext4_es_cache_extent. Fabricating an integer overflow, A local attacker with a special user privilege may cause a system crash problem which can lead to an availability threat.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: integer overflow in ext4_es_cache_extent", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3428" }, { "category": "external", "summary": "RHBZ#1936786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1936786" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3428", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3428" } ], "release_date": "2021-01-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: integer overflow in ext4_es_cache_extent" }, { "acknowledgments": [ { "names": [ "Remy" ], "organization": "GreyNoiseIO" } ], "cve": "CVE-2023-1390", "cwe": { "id": "CWE-1050", "name": "Excessive Platform Resource Consumption within a Loop" }, "discovery_date": "2022-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2178212" } ], "notes": [ { "category": "description", "text": "A remote denial of service vulnerability was found in the Linux kernel\u2019s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: remote DoS in TIPC kernel module", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6 and 7 are not affected by this issue as they did not include the affected code in `tipc_link_xmit`, introduced in upstream kernel version 4.3 (commit af9b028 \"tipc: make media xmit call outside node spinlock context\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "RHBZ#2178212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1390", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390" }, { "category": "external", "summary": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5", "url": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5" }, { "category": "external", "summary": "https://infosec.exchange/@_mattata/109427999461122360", "url": "https://infosec.exchange/@_mattata/109427999461122360" } ], "release_date": "2021-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: remote DoS in TIPC kernel module" } ] }
rhsa-2023_4126
Vulnerability from csaf_redhat
Published
2023-07-18 07:48
Modified
2024-11-15 17:22
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)
* kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation (CVE-2023-1281)
* kernel: remote DoS in TIPC kernel module (CVE-2023-1390)
* kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* kernel-rt: update RT source tree to the RHEL-8.2.z27 source tree (BZ#2209127)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)\n\n* kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation (CVE-2023-1281)\n\n* kernel: remote DoS in TIPC kernel module (CVE-2023-1390)\n\n* kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the RHEL-8.2.z27 source tree (BZ#2209127)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:4126", "url": "https://access.redhat.com/errata/RHSA-2023:4126" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2176192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176192" }, { "category": "external", "summary": "2178212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178212" }, { "category": "external", "summary": "2181847", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2181847" }, { "category": "external", "summary": "2196105", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196105" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_4126.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2024-11-15T17:22:42+00:00", "generator": { "date": "2024-11-15T17:22:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2023:4126", "initial_release_date": "2023-07-18T07:48:37+00:00", "revision_history": [ { "date": "2023-07-18T07:48:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-07-18T07:48:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T17:22:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.2::realtime" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.2::nfv" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "product": { "name": "kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "product_id": "kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.109.1.rt13.160.el8_2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product": { "name": "kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_id": "kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.109.1.rt13.160.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product": { "name": "kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_id": "kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.109.1.rt13.160.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product": { "name": "kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_id": "kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.109.1.rt13.160.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product": { "name": "kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_id": "kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.109.1.rt13.160.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product": { "name": "kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_id": "kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.109.1.rt13.160.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_id": "kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.109.1.rt13.160.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product": { "name": "kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_id": "kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.109.1.rt13.160.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.109.1.rt13.160.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product": { "name": "kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_id": "kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.109.1.rt13.160.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product": { "name": "kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_id": "kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.109.1.rt13.160.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product": { "name": "kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_id": "kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.109.1.rt13.160.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product": { "name": "kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_id": "kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.109.1.rt13.160.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.109.1.rt13.160.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product": { "name": "kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_id": "kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.109.1.rt13.160.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.109.1.rt13.160.el8_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src as a component of Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src" }, "product_reference": "kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "relates_to_product_reference": "NFV-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src as a component of Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src" }, "product_reference": "kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "relates_to_product_reference": "RT-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-0461", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2176192" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net/ulp: use-after-free in listening ULP sockets", "title": "Vulnerability summary" }, { "category": "other", "text": "Versions of Red Hat Enterprise Linux before 8 are not affected by this vulnerability as they did not include the upstream commit 734942c (\"tcp: ULP infrastructure\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-0461" }, { "category": "external", "summary": "RHBZ#2176192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176192" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0461", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0461" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461" }, { "category": "external", "summary": "https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c", "url": "https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c" } ], "release_date": "2023-02-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T07:48:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4126" }, { "category": "workaround", "details": "To mitigate this issue, prevent module tls from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: net/ulp: use-after-free in listening ULP sockets" }, { "cve": "CVE-2023-1281", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2181847" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The imperfect hash area can be updated while packets are traversing. This issue could allow a local attacker to cause a use-after-free problem, leading to privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation", "title": "Vulnerability summary" }, { "category": "other", "text": "For the Red Hat Enterprise Linux 7, please use mitigation to disable module cls_tcindex, because some other bugs exists in the Linux Kernel traffic control index filter too that not going to be fixed before Red Hat Enterprise Linux 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-1281" }, { "category": "external", "summary": "RHBZ#2181847", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2181847" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1281", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1281" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1281", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1281" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2" } ], "release_date": "2023-02-23T06:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T07:48:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4126" }, { "category": "workaround", "details": "This flaw can be mitigated by preventing the affected traffic control index filter (cls_tcindex) kernel module from loading during the boot time, ensure the module is added into the blacklist file.\n~~~\nRefer: \nHow do I blacklist a kernel module to prevent it from loading automatically? \nhttps://access.redhat.com/solutions/41278\n~~~", "product_ids": [ "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation" }, { "acknowledgments": [ { "names": [ "Remy" ], "organization": "GreyNoiseIO" } ], "cve": "CVE-2023-1390", "cwe": { "id": "CWE-1050", "name": "Excessive Platform Resource Consumption within a Loop" }, "discovery_date": "2022-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2178212" } ], "notes": [ { "category": "description", "text": "A remote denial of service vulnerability was found in the Linux kernel\u2019s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: remote DoS in TIPC kernel module", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6 and 7 are not affected by this issue as they did not include the affected code in `tipc_link_xmit`, introduced in upstream kernel version 4.3 (commit af9b028 \"tipc: make media xmit call outside node spinlock context\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "RHBZ#2178212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1390", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390" }, { "category": "external", "summary": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5", "url": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5" }, { "category": "external", "summary": "https://infosec.exchange/@_mattata/109427999461122360", "url": "https://infosec.exchange/@_mattata/109427999461122360" } ], "release_date": "2021-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T07:48:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4126" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: remote DoS in TIPC kernel module" }, { "acknowledgments": [ { "names": [ "Patryk Sondej", "Piotr Krysiuk" ] } ], "cve": "CVE-2023-32233", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-05-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2196105" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the Netfilter subsystem of the Linux kernel when processing batch requests to update nf_tables configuration. This vulnerability can be abused to perform arbitrary reads and writes in kernel memory. A local user (with CAP_NET_ADMIN capability) could use this flaw to crash the system or potentially escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation", "title": "Vulnerability summary" }, { "category": "other", "text": "Only local users with `CAP_NET_ADMIN` capability (or root) can trigger this issue. \nOn Red Hat Enterprise Linux, local unprivileged users can exploit unprivileged user namespaces (CONFIG_USER_NS) to grant themselves this capability.\n\nThe OpenShift Container Platform (OCP) control planes or master machines are based on Red Hat Enterprise Linux CoreOS (RHCOS) that consists primarily of RHEL components, hence is also affected by this kernel vulnerability. Like it is mentioned earlier, the successful exploit needs necessary privileges (CAP_NET_ADMIN) and direct, local access . Local user in RHCOS is already a root with full permissions, hence existence of this vulnerability does not bring any value from the potential attacker perspective. From the OpenShift containers perspective, this vulnerability cannot be exploited as in OpenShift the cluster processes on the node are namespaced, which means that switching in the running OpenShift container the namespace will not bring necessary capabilities.\nThis means that for OpenShift, the impact of this vulnerability is Low.\nSimilar to CVE-2023-32233 vulnerability has been explained in the following blog post as an example of \"Container escape vulnerability\":\nhttps://www.redhat.com/en/blog/containers-vulnerability-risk-assessment", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32233" }, { "category": "external", "summary": "RHBZ#2196105", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196105" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32233", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32233" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32233", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32233" }, { "category": "external", "summary": "https://github.com/torvalds/linux/commit/c1592a89942e9678f7d9c8030efa777c0d57edab", "url": "https://github.com/torvalds/linux/commit/c1592a89942e9678f7d9c8030efa777c0d57edab" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2023/05/08/4", "url": "https://www.openwall.com/lists/oss-security/2023/05/08/4" } ], "release_date": "2023-05-02T04:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T07:48:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4126" }, { "category": "workaround", "details": "1. This flaw can be mitigated by preventing the affected netfilter (nf_tables) kernel module from being loaded. For instructions on how to blacklist a kernel module, please see https://access.redhat.com/solutions/41278.\n\n2. If the module cannot be disabled, on non-containerized deployments of Red Hat Enterprise Linux, the mitigation is to disable user namespaces:\n```\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n```\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use the second mitigation (disabling user namespaces) as the functionality is needed to be enabled. The first mitigation (blacklisting nf_tables) is still viable for containerized deployments, providing the environment is not using netfilter.", "product_ids": [ "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation" } ] }
rhsa-2023_4146
Vulnerability from csaf_redhat
Published
2023-07-18 09:03
Modified
2024-11-15 17:22
Summary
Red Hat Security Advisory: kpatch-patch security update
Notes
Topic
An update for kpatch-patch-4_18_0-193_100_1, kpatch-patch-4_18_0-193_105_1, kpatch-patch-4_18_0-193_95_1, and kpatch-patch-4_18_0-193_98_1 is now available for Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
* kernel: net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)
* kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation (CVE-2023-1281)
* kernel: remote DoS in TIPC kernel module (CVE-2023-1390)
* kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kpatch-patch-4_18_0-193_100_1, kpatch-patch-4_18_0-193_105_1, kpatch-patch-4_18_0-193_95_1, and kpatch-patch-4_18_0-193_98_1 is now available for Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)\n\n* kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation (CVE-2023-1281)\n\n* kernel: remote DoS in TIPC kernel module (CVE-2023-1390)\n\n* kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:4146", "url": "https://access.redhat.com/errata/RHSA-2023:4146" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2176192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176192" }, { "category": "external", "summary": "2178212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178212" }, { "category": "external", "summary": "2181847", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2181847" }, { "category": "external", "summary": "2196105", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196105" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_4146.json" } ], "title": "Red Hat Security Advisory: kpatch-patch security update", "tracking": { "current_release_date": "2024-11-15T17:22:52+00:00", "generator": { "date": "2024-11-15T17:22:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2023:4146", "initial_release_date": "2023-07-18T09:03:53+00:00", "revision_history": [ { "date": "2023-07-18T09:03:53+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-07-18T09:03:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T17:22:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:8.2::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "product": { "name": "kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "product_id": "kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_95_1@1-4.el8_2?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "product": { "name": "kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "product_id": "kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_98_1@1-3.el8_2?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "product": { "name": "kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "product_id": "kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_100_1@1-2.el8_2?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "product": { "name": "kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "product_id": "kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_105_1@1-1.el8_2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_95_1@1-4.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_95_1-debugsource@1-4.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_95_1-debuginfo@1-4.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_98_1@1-3.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_98_1-debugsource@1-3.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_98_1-debuginfo@1-3.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_100_1@1-2.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_100_1-debugsource@1-2.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_100_1-debuginfo@1-2.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_105_1@1-1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_105_1-debugsource@1-1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_105_1-debuginfo@1-1.el8_2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_95_1@1-4.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_95_1-debugsource@1-4.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_95_1-debuginfo@1-4.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_98_1@1-3.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_98_1-debugsource@1-3.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_98_1-debuginfo@1-3.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_100_1@1-2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_100_1-debugsource@1-2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_100_1-debuginfo@1-2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_105_1@1-1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_105_1-debugsource@1-1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_105_1-debuginfo@1-1.el8_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src" }, "product_reference": "kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src" }, "product_reference": "kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src" }, "product_reference": "kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src" }, "product_reference": "kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-0461", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2176192" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net/ulp: use-after-free in listening ULP sockets", "title": "Vulnerability summary" }, { "category": "other", "text": "Versions of Red Hat Enterprise Linux before 8 are not affected by this vulnerability as they did not include the upstream commit 734942c (\"tcp: ULP infrastructure\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-0461" }, { "category": "external", "summary": "RHBZ#2176192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176192" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0461", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0461" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461" }, { "category": "external", "summary": "https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c", "url": "https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c" } ], "release_date": "2023-02-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T09:03:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4146" }, { "category": "workaround", "details": "To mitigate this issue, prevent module tls from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: net/ulp: use-after-free in listening ULP sockets" }, { "cve": "CVE-2023-1281", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2181847" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The imperfect hash area can be updated while packets are traversing. This issue could allow a local attacker to cause a use-after-free problem, leading to privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation", "title": "Vulnerability summary" }, { "category": "other", "text": "For the Red Hat Enterprise Linux 7, please use mitigation to disable module cls_tcindex, because some other bugs exists in the Linux Kernel traffic control index filter too that not going to be fixed before Red Hat Enterprise Linux 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-1281" }, { "category": "external", "summary": "RHBZ#2181847", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2181847" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1281", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1281" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1281", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1281" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2" } ], "release_date": "2023-02-23T06:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T09:03:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4146" }, { "category": "workaround", "details": "This flaw can be mitigated by preventing the affected traffic control index filter (cls_tcindex) kernel module from loading during the boot time, ensure the module is added into the blacklist file.\n~~~\nRefer: \nHow do I blacklist a kernel module to prevent it from loading automatically? \nhttps://access.redhat.com/solutions/41278\n~~~", "product_ids": [ "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation" }, { "acknowledgments": [ { "names": [ "Remy" ], "organization": "GreyNoiseIO" } ], "cve": "CVE-2023-1390", "cwe": { "id": "CWE-1050", "name": "Excessive Platform Resource Consumption within a Loop" }, "discovery_date": "2022-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2178212" } ], "notes": [ { "category": "description", "text": "A remote denial of service vulnerability was found in the Linux kernel\u2019s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: remote DoS in TIPC kernel module", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6 and 7 are not affected by this issue as they did not include the affected code in `tipc_link_xmit`, introduced in upstream kernel version 4.3 (commit af9b028 \"tipc: make media xmit call outside node spinlock context\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "RHBZ#2178212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1390", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390" }, { "category": "external", "summary": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5", "url": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5" }, { "category": "external", "summary": "https://infosec.exchange/@_mattata/109427999461122360", "url": "https://infosec.exchange/@_mattata/109427999461122360" } ], "release_date": "2021-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T09:03:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4146" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: remote DoS in TIPC kernel module" }, { "acknowledgments": [ { "names": [ "Patryk Sondej", "Piotr Krysiuk" ] } ], "cve": "CVE-2023-32233", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-05-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2196105" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the Netfilter subsystem of the Linux kernel when processing batch requests to update nf_tables configuration. This vulnerability can be abused to perform arbitrary reads and writes in kernel memory. A local user (with CAP_NET_ADMIN capability) could use this flaw to crash the system or potentially escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation", "title": "Vulnerability summary" }, { "category": "other", "text": "Only local users with `CAP_NET_ADMIN` capability (or root) can trigger this issue. \nOn Red Hat Enterprise Linux, local unprivileged users can exploit unprivileged user namespaces (CONFIG_USER_NS) to grant themselves this capability.\n\nThe OpenShift Container Platform (OCP) control planes or master machines are based on Red Hat Enterprise Linux CoreOS (RHCOS) that consists primarily of RHEL components, hence is also affected by this kernel vulnerability. Like it is mentioned earlier, the successful exploit needs necessary privileges (CAP_NET_ADMIN) and direct, local access . Local user in RHCOS is already a root with full permissions, hence existence of this vulnerability does not bring any value from the potential attacker perspective. From the OpenShift containers perspective, this vulnerability cannot be exploited as in OpenShift the cluster processes on the node are namespaced, which means that switching in the running OpenShift container the namespace will not bring necessary capabilities.\nThis means that for OpenShift, the impact of this vulnerability is Low.\nSimilar to CVE-2023-32233 vulnerability has been explained in the following blog post as an example of \"Container escape vulnerability\":\nhttps://www.redhat.com/en/blog/containers-vulnerability-risk-assessment", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32233" }, { "category": "external", "summary": "RHBZ#2196105", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196105" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32233", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32233" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32233", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32233" }, { "category": "external", "summary": "https://github.com/torvalds/linux/commit/c1592a89942e9678f7d9c8030efa777c0d57edab", "url": "https://github.com/torvalds/linux/commit/c1592a89942e9678f7d9c8030efa777c0d57edab" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2023/05/08/4", "url": "https://www.openwall.com/lists/oss-security/2023/05/08/4" } ], "release_date": "2023-05-02T04:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T09:03:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4146" }, { "category": "workaround", "details": "1. This flaw can be mitigated by preventing the affected netfilter (nf_tables) kernel module from being loaded. For instructions on how to blacklist a kernel module, please see https://access.redhat.com/solutions/41278.\n\n2. If the module cannot be disabled, on non-containerized deployments of Red Hat Enterprise Linux, the mitigation is to disable user namespaces:\n```\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n```\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use the second mitigation (disabling user namespaces) as the functionality is needed to be enabled. The first mitigation (blacklisting nf_tables) is still viable for containerized deployments, providing the environment is not using netfilter.", "product_ids": [ "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation" } ] }
rhsa-2023_3191
Vulnerability from csaf_redhat
Published
2023-05-17 15:27
Modified
2024-11-15 13:32
Summary
Red Hat Security Advisory: kpatch-patch security update
Notes
Topic
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
* kernel: net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)
* kernel: remote DoS in TIPC kernel module (CVE-2023-1390)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)\n\n* kernel: remote DoS in TIPC kernel module (CVE-2023-1390)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:3191", "url": "https://access.redhat.com/errata/RHSA-2023:3191" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2176192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176192" }, { "category": "external", "summary": "2178212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178212" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3191.json" } ], "title": "Red Hat Security Advisory: kpatch-patch security update", "tracking": { "current_release_date": "2024-11-15T13:32:57+00:00", "generator": { "date": "2024-11-15T13:32:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2023:3191", "initial_release_date": "2023-05-17T15:27:55+00:00", "revision_history": [ { "date": "2023-05-17T15:27:55+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-05-17T15:27:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T13:32:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:8.1::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.src", "product": { "name": "kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.src", "product_id": "kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_76_1@1-4.el8_1?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.src", "product": { "name": "kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.src", "product_id": "kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_77_1@1-4.el8_1?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.src", "product": { "name": "kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.src", "product_id": "kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_78_1@1-3.el8_1?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.src", "product": { "name": "kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.src", "product_id": "kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_80_1@1-2.el8_1?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.src", "product": { "name": "kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.src", "product_id": "kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_81_1@1-1.el8_1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_76_1@1-4.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_76_1-debugsource@1-4.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_76_1-debuginfo@1-4.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_77_1@1-4.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_77_1-debugsource@1-4.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_77_1-debuginfo@1-4.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_78_1@1-3.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_78_1-debugsource@1-3.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_78_1-debuginfo@1-3.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_80_1@1-2.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_80_1-debugsource@1-2.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_80_1-debuginfo@1-2.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_81_1@1-1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_81_1-debugsource@1-1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_81_1-debuginfo@1-1.el8_1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_76_1@1-4.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_76_1-debugsource@1-4.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_76_1-debuginfo@1-4.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_77_1@1-4.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_77_1-debugsource@1-4.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_77_1-debuginfo@1-4.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_78_1@1-3.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_78_1-debugsource@1-3.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_78_1-debuginfo@1-3.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_80_1@1-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_80_1-debugsource@1-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_80_1-debuginfo@1-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_81_1@1-1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_81_1-debugsource@1-1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_81_1-debuginfo@1-1.el8_1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.src" }, "product_reference": "kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.src" }, "product_reference": "kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.src" }, "product_reference": "kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.src" }, "product_reference": "kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.src" }, "product_reference": "kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-0461", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2176192" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net/ulp: use-after-free in listening ULP sockets", "title": "Vulnerability summary" }, { "category": "other", "text": "Versions of Red Hat Enterprise Linux before 8 are not affected by this vulnerability as they did not include the upstream commit 734942c (\"tcp: ULP infrastructure\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-0461" }, { "category": "external", "summary": "RHBZ#2176192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176192" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0461", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0461" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461" }, { "category": "external", "summary": "https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c", "url": "https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c" } ], "release_date": "2023-02-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-17T15:27:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3191" }, { "category": "workaround", "details": "To mitigate this issue, prevent module tls from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: net/ulp: use-after-free in listening ULP sockets" }, { "acknowledgments": [ { "names": [ "Remy" ], "organization": "GreyNoiseIO" } ], "cve": "CVE-2023-1390", "cwe": { "id": "CWE-1050", "name": "Excessive Platform Resource Consumption within a Loop" }, "discovery_date": "2022-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2178212" } ], "notes": [ { "category": "description", "text": "A remote denial of service vulnerability was found in the Linux kernel\u2019s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: remote DoS in TIPC kernel module", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6 and 7 are not affected by this issue as they did not include the affected code in `tipc_link_xmit`, introduced in upstream kernel version 4.3 (commit af9b028 \"tipc: make media xmit call outside node spinlock context\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "RHBZ#2178212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1390", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390" }, { "category": "external", "summary": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5", "url": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5" }, { "category": "external", "summary": "https://infosec.exchange/@_mattata/109427999461122360", "url": "https://infosec.exchange/@_mattata/109427999461122360" } ], "release_date": "2021-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-17T15:27:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3191" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: remote DoS in TIPC kernel module" } ] }
rhsa-2023_3190
Vulnerability from csaf_redhat
Published
2023-05-17 15:27
Modified
2024-11-15 13:34
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)
* kernel: remote DoS in TIPC kernel module (CVE-2023-1390)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)\n\n* kernel: remote DoS in TIPC kernel module (CVE-2023-1390)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:3190", "url": "https://access.redhat.com/errata/RHSA-2023:3190" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2176192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176192" }, { "category": "external", "summary": "2178212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178212" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3190.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-15T13:34:17+00:00", "generator": { "date": "2024-11-15T13:34:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2023:3190", "initial_release_date": "2023-05-17T15:27:55+00:00", "revision_history": [ { "date": "2023-05-17T15:27:55+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-05-17T15:27:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T13:34:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:8.1::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "bpftool-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "bpftool-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-core-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-core-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-debug-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-tools-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "perf-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "perf-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "python3-perf-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "python3-perf-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.83.1.el8_1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "bpftool-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "bpftool-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-core-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-core-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-debug-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-debug-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-debug-core-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-devel-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-devel-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-headers-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-headers-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-modules-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-modules-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-tools-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-tools-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "perf-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "perf-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "python3-perf-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "python3-perf-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.83.1.el8_1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.18.0-147.83.1.el8_1.src", "product": { "name": "kernel-0:4.18.0-147.83.1.el8_1.src", "product_id": "kernel-0:4.18.0-147.83.1.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-147.83.1.el8_1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:4.18.0-147.83.1.el8_1.noarch", "product": { "name": "kernel-abi-whitelists-0:4.18.0-147.83.1.el8_1.noarch", "product_id": "kernel-abi-whitelists-0:4.18.0-147.83.1.el8_1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-147.83.1.el8_1?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-147.83.1.el8_1.noarch", "product": { "name": "kernel-doc-0:4.18.0-147.83.1.el8_1.noarch", "product_id": "kernel-doc-0:4.18.0-147.83.1.el8_1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-147.83.1.el8_1?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "bpftool-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "bpftool-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.83.1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.src" }, "product_reference": "kernel-0:4.18.0-147.83.1.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-147.83.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.83.1.el8_1.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-147.83.1.el8_1.noarch", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-core-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-147.83.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.83.1.el8_1.noarch" }, "product_reference": "kernel-doc-0:4.18.0-147.83.1.el8_1.noarch", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "perf-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "perf-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "python3-perf-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-0461", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-02-23T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.83.1.el8_1.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2176192" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net/ulp: use-after-free in listening ULP sockets", "title": "Vulnerability summary" }, { "category": "other", "text": "Versions of Red Hat Enterprise Linux before 8 are not affected by this vulnerability as they did not include the upstream commit 734942c (\"tcp: ULP infrastructure\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.src", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.83.1.el8_1.noarch", "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.83.1.el8_1.noarch", "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64" ], "known_not_affected": [ "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.83.1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-0461" }, { "category": "external", "summary": "RHBZ#2176192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176192" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0461", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0461" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461" }, { "category": "external", "summary": "https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c", "url": "https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c" } ], "release_date": "2023-02-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-17T15:27:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.src", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.83.1.el8_1.noarch", "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.83.1.el8_1.noarch", "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2023:3190" }, { "category": "workaround", "details": "To mitigate this issue, prevent module tls from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.src", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.83.1.el8_1.noarch", "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.83.1.el8_1.noarch", "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.src", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.83.1.el8_1.noarch", "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.83.1.el8_1.noarch", "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: net/ulp: use-after-free in listening ULP sockets" }, { "acknowledgments": [ { "names": [ "Remy" ], "organization": "GreyNoiseIO" } ], "cve": "CVE-2023-1390", "cwe": { "id": "CWE-1050", "name": "Excessive Platform Resource Consumption within a Loop" }, "discovery_date": "2022-11-30T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.83.1.el8_1.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2178212" } ], "notes": [ { "category": "description", "text": "A remote denial of service vulnerability was found in the Linux kernel\u2019s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: remote DoS in TIPC kernel module", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6 and 7 are not affected by this issue as they did not include the affected code in `tipc_link_xmit`, introduced in upstream kernel version 4.3 (commit af9b028 \"tipc: make media xmit call outside node spinlock context\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.src", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.83.1.el8_1.noarch", "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.83.1.el8_1.noarch", "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64" ], "known_not_affected": [ "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.83.1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "RHBZ#2178212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1390", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390" }, { "category": "external", "summary": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5", "url": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5" }, { "category": "external", "summary": "https://infosec.exchange/@_mattata/109427999461122360", "url": "https://infosec.exchange/@_mattata/109427999461122360" } ], "release_date": "2021-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-17T15:27:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.src", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.83.1.el8_1.noarch", "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.83.1.el8_1.noarch", "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2023:3190" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.src", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.83.1.el8_1.noarch", "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.83.1.el8_1.noarch", "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: remote DoS in TIPC kernel module" } ] }
wid-sec-w-2023-0654
Vulnerability from csaf_certbund
Published
2023-03-14 23:00
Modified
2024-05-30 22:00
Summary
Linux Kernel: Schwachstelle ermöglicht Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0654 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0654.json" }, { "category": "self", "summary": "WID-SEC-2023-0654 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0654" }, { "category": "external", "summary": "Red Hat Bugzilla \u2013 Bug 2178212 vom 2023-03-14", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178212" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1801-1 vom 2023-04-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014437.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1800-1 vom 2023-04-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014435.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1803-1 vom 2023-04-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014434.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1811-1 vom 2023-04-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014442.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1848-1 vom 2023-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014466.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1892-1 vom 2023-04-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014489.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1894-1 vom 2023-04-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014488.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5791-2 vom 2023-04-26", "url": "https://ubuntu.com/security/notices/USN-6045-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2232-1 vom 2023-05-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014918.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3190 vom 2023-05-17", "url": "https://access.redhat.com/errata/RHSA-2023:3190" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3191 vom 2023-05-17", "url": "https://access.redhat.com/errata/RHSA-2023:3191" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2660-1 vom 2023-06-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015332.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2690-1 vom 2023-06-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015353.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2679-1 vom 2023-06-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015351.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2689-1 vom 2023-06-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015354.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2666-1 vom 2023-06-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015345.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2698-1 vom 2023-06-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015362.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2695-1 vom 2023-06-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015364.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2681-1 vom 2023-06-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015349.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2686-1 vom 2023-06-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015356.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2694-1 vom 2023-06-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015352.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2701-1 vom 2023-06-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015369.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2710-1 vom 2023-06-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015377.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2708-1 vom 2023-06-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015379.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2727-1 vom 2023-06-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015386.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2702-1 vom 2023-06-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015381.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2718-1 vom 2023-06-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015374.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2724-1 vom 2023-06-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015385.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2719-1 vom 2023-06-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015372.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2741-1 vom 2023-06-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015389.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2805-1 vom 2023-07-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4125 vom 2023-07-18", "url": "https://access.redhat.com/errata/RHSA-2023:4125" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4146 vom 2023-07-18", "url": "https://access.redhat.com/errata/RHSA-2023:4146" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4126 vom 2023-07-18", "url": "https://access.redhat.com/errata/RHSA-2023:4126" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-058 vom 2024-05-30", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-058.html" } ], "source_lang": "en-US", "title": "Linux Kernel: Schwachstelle erm\u00f6glicht Denial of Service", "tracking": { "current_release_date": "2024-05-30T22:00:00.000+00:00", "generator": { "date": "2024-05-31T10:06:34.451+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-0654", "initial_release_date": "2023-03-14T23:00:00.000+00:00", "revision_history": [ { "date": "2023-03-14T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-04-10T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-04-11T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-04-16T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-04-18T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-04-26T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-05-18T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE und Red Hat aufgenommen" }, { "date": "2023-06-27T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-06-28T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-06-29T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-07-02T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-07-10T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-07-17T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-05-30T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Amazon aufgenommen" } ], "status": "final", "version": "14" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c5.11-rc4", "product": { "name": "Open Source Linux Kernel \u003c5.11-rc4", "product_id": "T026736", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:5.11-rc4" } } } ], "category": "product_name", "name": "Linux Kernel" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-1390", "notes": [ { "category": "description", "text": "Im Linux-Kernel besteht eine Schwachstelle bez\u00fcglich des \"TIPC-Kernelmoduls\", wenn dieses einen \"UDP-Bearer\" konfiguriert hat. Wenn das System zwei kleine UDP-Pakete empf\u00e4ngt, versucht \"tipc_link_xmit()\", Elemente zu parsen, die sich nicht in der Warteschlange befinden, was zu einer 100%igen CPU-Auslastung f\u00fchrt. Ein entfernter, anonymer Angreifer kann dies f\u00fcr einen Denial-of-Service-Angriff ausnutzen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T000126", "398363" ] }, "release_date": "2023-03-14T23:00:00Z", "title": "CVE-2023-1390" } ] }
wid-sec-w-2024-0794
Vulnerability from csaf_certbund
Published
2024-04-04 22:00
Modified
2024-04-04 22:00
Summary
Dell ECS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Dell ECS ist ein Objektspeichersystem.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Dell ECS ist ein Objektspeichersystem.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0794 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json" }, { "category": "self", "summary": "WID-SEC-2024-0794 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-141 vom 2024-04-04", "url": "https://www.dell.com/support/kbdoc/000223839/dsa-2024-=" } ], "source_lang": "en-US", "title": "Dell ECS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-04-04T22:00:00.000+00:00", "generator": { "date": "2024-04-05T09:37:24.604+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0794", "initial_release_date": "2024-04-04T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-04T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 3.8.1.0", "product": { "name": "Dell ECS \u003c 3.8.1.0", "product_id": "T033919", "product_identification_helper": { "cpe": "cpe:/h:dell:ecs:3.8.1.0" } } } ], "category": "product_name", "name": "ECS" } ], "category": "vendor", "name": "Dell" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-18074", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2018-18074" }, { "cve": "CVE-2020-10663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10663" }, { "cve": "CVE-2020-10672", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10672" }, { "cve": "CVE-2020-10673", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10673" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10735" }, { "cve": "CVE-2020-10968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10968" }, { "cve": "CVE-2020-10969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10969" }, { "cve": "CVE-2020-11111", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11111" }, { "cve": "CVE-2020-11112", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11112" }, { "cve": "CVE-2020-11113", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11113" }, { "cve": "CVE-2020-11612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11612" }, { "cve": "CVE-2020-11619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11619" }, { "cve": "CVE-2020-11620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11620" }, { "cve": "CVE-2020-11979", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11979" }, { "cve": "CVE-2020-12762", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12762" }, { "cve": "CVE-2020-12825", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12825" }, { "cve": "CVE-2020-13956", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-13956" }, { "cve": "CVE-2020-14060", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14060" }, { "cve": "CVE-2020-14061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14061" }, { "cve": "CVE-2020-14062", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14062" }, { "cve": "CVE-2020-14195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14195" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-1945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1945" }, { "cve": "CVE-2020-1967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1967" }, { "cve": "CVE-2020-1971", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1971" }, { "cve": "CVE-2020-24616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24616" }, { "cve": "CVE-2020-24750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24750" }, { "cve": "CVE-2020-25649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25649" }, { "cve": "CVE-2020-25658", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25658" }, { "cve": "CVE-2020-26116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26116" }, { "cve": "CVE-2020-26137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26137" }, { "cve": "CVE-2020-26541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26541" }, { "cve": "CVE-2020-27216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27216" }, { "cve": "CVE-2020-27218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27218" }, { "cve": "CVE-2020-27223", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27223" }, { "cve": "CVE-2020-28366", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28366" }, { "cve": "CVE-2020-28493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28493" }, { "cve": "CVE-2020-29509", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29509" }, { "cve": "CVE-2020-29511", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29511" }, { "cve": "CVE-2020-29582", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29582" }, { "cve": "CVE-2020-29651", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29651" }, { "cve": "CVE-2020-35490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35490" }, { "cve": "CVE-2020-35491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35491" }, { "cve": "CVE-2020-35728", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35728" }, { "cve": "CVE-2020-36179", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36179" }, { "cve": "CVE-2020-36180", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36180" }, { "cve": "CVE-2020-36181", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36181" }, { "cve": "CVE-2020-36182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36182" }, { "cve": "CVE-2020-36183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36183" }, { "cve": "CVE-2020-36184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36184" }, { "cve": "CVE-2020-36185", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36185" }, { "cve": "CVE-2020-36186", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36186" }, { "cve": "CVE-2020-36187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36187" }, { "cve": "CVE-2020-36188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36188" }, { "cve": "CVE-2020-36189", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36189" }, { "cve": "CVE-2020-36516", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36516" }, { "cve": "CVE-2020-36518", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36518" }, { "cve": "CVE-2020-36557", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36557" }, { "cve": "CVE-2020-36558", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36558" }, { "cve": "CVE-2020-36691", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36691" }, { "cve": "CVE-2020-7238", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-7238" }, { "cve": "CVE-2020-8840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8840" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8908" }, { "cve": "CVE-2020-8911", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8911" }, { "cve": "CVE-2020-8912", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8912" }, { "cve": "CVE-2020-9488", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9488" }, { "cve": "CVE-2020-9493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9493" }, { "cve": "CVE-2020-9546", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9546" }, { "cve": "CVE-2020-9547", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9547" }, { "cve": "CVE-2020-9548", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9548" }, { "cve": "CVE-2021-20190", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20190" }, { "cve": "CVE-2021-20323", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20323" }, { "cve": "CVE-2021-21290", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21290" }, { "cve": "CVE-2021-21295", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21295" }, { "cve": "CVE-2021-21409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21409" }, { "cve": "CVE-2021-23840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23840" }, { "cve": "CVE-2021-23841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23841" }, { "cve": "CVE-2021-2471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-2471" }, { "cve": "CVE-2021-25642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-25642" }, { "cve": "CVE-2021-26341", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-26341" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-28153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28153" }, { "cve": "CVE-2021-28165", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28165" }, { "cve": "CVE-2021-28169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28169" }, { "cve": "CVE-2021-28861", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28861" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-30560", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-30560" }, { "cve": "CVE-2021-3114", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3114" }, { "cve": "CVE-2021-33036", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33036" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33503" }, { "cve": "CVE-2021-33655", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33655" }, { "cve": "CVE-2021-33656", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33656" }, { "cve": "CVE-2021-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3424" }, { "cve": "CVE-2021-34428", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-34428" }, { "cve": "CVE-2021-3449", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3449" }, { "cve": "CVE-2021-3450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3450" }, { "cve": "CVE-2021-3530", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3530" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36373" }, { "cve": "CVE-2021-36374", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36374" }, { "cve": "CVE-2021-3648", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3648" }, { "cve": "CVE-2021-36690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36690" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3712" }, { "cve": "CVE-2021-37136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37136" }, { "cve": "CVE-2021-37137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37137" }, { "cve": "CVE-2021-37404", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37404" }, { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37533" }, { "cve": "CVE-2021-3754", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3754" }, { "cve": "CVE-2021-3778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3778" }, { "cve": "CVE-2021-3796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3796" }, { "cve": "CVE-2021-3826", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3826" }, { "cve": "CVE-2021-3827", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3827" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-3872", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3872" }, { "cve": "CVE-2021-3875", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3875" }, { "cve": "CVE-2021-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3903" }, { "cve": "CVE-2021-3923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3923" }, { "cve": "CVE-2021-3927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3927" }, { "cve": "CVE-2021-3928", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3928" }, { "cve": "CVE-2021-3968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3968" }, { "cve": "CVE-2021-3973", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3973" }, { "cve": "CVE-2021-3974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3974" }, { "cve": "CVE-2021-3984", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3984" }, { "cve": "CVE-2021-4019", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4019" }, { "cve": "CVE-2021-4037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4037" }, { "cve": "CVE-2021-4069", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4069" }, { "cve": "CVE-2021-4104", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4104" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4136" }, { "cve": "CVE-2021-4157", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4157" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4203", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4203" }, { "cve": "CVE-2021-42567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-42567" }, { "cve": "CVE-2021-43797", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-43797" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44878", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44878" }, { "cve": "CVE-2021-45078", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-45078" }, { "cve": "CVE-2021-46195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46195" }, { "cve": "CVE-2021-46828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46828" }, { "cve": "CVE-2021-46848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46848" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0128" }, { "cve": "CVE-2022-0213", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0213" }, { "cve": "CVE-2022-0225", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0225" }, { "cve": "CVE-2022-0261", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0261" }, { "cve": "CVE-2022-0318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0318" }, { "cve": "CVE-2022-0319", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0319" }, { "cve": "CVE-2022-0351", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0351" }, { "cve": "CVE-2022-0359", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0359" }, { "cve": "CVE-2022-0361", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0361" }, { "cve": "CVE-2022-0392", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0392" }, { "cve": "CVE-2022-0407", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0407" }, { "cve": "CVE-2022-0413", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0413" }, { "cve": "CVE-2022-0561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0561" }, { "cve": "CVE-2022-0696", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0696" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1184" }, { "cve": "CVE-2022-1245", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1245" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1381", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1381" }, { "cve": "CVE-2022-1420", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1420" }, { "cve": "CVE-2022-1462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1466" }, { "cve": "CVE-2022-1471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1471" }, { "cve": "CVE-2022-1586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1586" }, { "cve": "CVE-2022-1587", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1587" }, { "cve": "CVE-2022-1616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1616" }, { "cve": "CVE-2022-1619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1619" }, { "cve": "CVE-2022-1620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1620" }, { "cve": "CVE-2022-1679", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1720", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1720" }, { "cve": "CVE-2022-1729", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1733", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1733" }, { "cve": "CVE-2022-1735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1735" }, { "cve": "CVE-2022-1771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1771" }, { "cve": "CVE-2022-1785", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1785" }, { "cve": "CVE-2022-1796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1796" }, { "cve": "CVE-2022-1851", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1851" }, { "cve": "CVE-2022-1897", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1897" }, { "cve": "CVE-2022-1898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1898" }, { "cve": "CVE-2022-1927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1927" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-1968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1968" }, { "cve": "CVE-2022-1974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1974" }, { "cve": "CVE-2022-1975", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1975" }, { "cve": "CVE-2022-20132", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20141" }, { "cve": "CVE-2022-20154", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20154" }, { "cve": "CVE-2022-20166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20166" }, { "cve": "CVE-2022-20368", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20368" }, { "cve": "CVE-2022-20369", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20369" }, { "cve": "CVE-2022-2047", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2047" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2048" }, { "cve": "CVE-2022-20567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20567" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-21216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21216" }, { "cve": "CVE-2022-21233", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21233" }, { "cve": "CVE-2022-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2124" }, { "cve": "CVE-2022-2125", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2125" }, { "cve": "CVE-2022-2126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2126" }, { "cve": "CVE-2022-2129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2129" }, { "cve": "CVE-2022-21363", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21363" }, { "cve": "CVE-2022-21385", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21385" }, { "cve": "CVE-2022-21499", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21499" }, { "cve": "CVE-2022-2153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2153" }, { "cve": "CVE-2022-21540", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21549" }, { "cve": "CVE-2022-21618", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21618" }, { "cve": "CVE-2022-21619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21619" }, { "cve": "CVE-2022-21624", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21624" }, { "cve": "CVE-2022-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21626" }, { "cve": "CVE-2022-21628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21628" }, { "cve": "CVE-2022-21702", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21702" }, { "cve": "CVE-2022-2175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2175" }, { "cve": "CVE-2022-2182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2182" }, { "cve": "CVE-2022-2183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2183" }, { "cve": "CVE-2022-2206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2206" }, { "cve": "CVE-2022-2207", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2207" }, { "cve": "CVE-2022-2208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2208" }, { "cve": "CVE-2022-2210", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2210" }, { "cve": "CVE-2022-2231", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2231" }, { "cve": "CVE-2022-2256", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2256" }, { "cve": "CVE-2022-2257", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2257" }, { "cve": "CVE-2022-2264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2264" }, { "cve": "CVE-2022-2284", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2284" }, { "cve": "CVE-2022-2285", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2285" }, { "cve": "CVE-2022-2286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2286" }, { "cve": "CVE-2022-2287", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2287" }, { "cve": "CVE-2022-22976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22976" }, { "cve": "CVE-2022-22978", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22978" }, { "cve": "CVE-2022-2304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2304" }, { "cve": "CVE-2022-2318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2318" }, { "cve": "CVE-2022-23302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23302" }, { "cve": "CVE-2022-23305", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23305" }, { "cve": "CVE-2022-23307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23307" }, { "cve": "CVE-2022-2343", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2343" }, { "cve": "CVE-2022-2344", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2344" }, { "cve": "CVE-2022-2345", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2345" }, { "cve": "CVE-2022-23471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23471" }, { "cve": "CVE-2022-23521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23521" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-24302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24302" }, { "cve": "CVE-2022-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24329" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-24903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24903" }, { "cve": "CVE-2022-2503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2503" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-25168", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25168" }, { "cve": "CVE-2022-2519", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2519" }, { "cve": "CVE-2022-2520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2520" }, { "cve": "CVE-2022-2521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2521" }, { "cve": "CVE-2022-2522", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2522" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-2571", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2571" }, { "cve": "CVE-2022-2580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2580" }, { "cve": "CVE-2022-2581", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2581" }, { "cve": "CVE-2022-25857", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25857" }, { "cve": "CVE-2022-2588", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2598", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2598" }, { "cve": "CVE-2022-26148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26148" }, { "cve": "CVE-2022-26365", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26365" }, { "cve": "CVE-2022-26373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26373" }, { "cve": "CVE-2022-2639", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2639" }, { "cve": "CVE-2022-26612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26612" }, { "cve": "CVE-2022-2663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2663" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27943", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27943" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-2816", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2816" }, { "cve": "CVE-2022-2817", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2817" }, { "cve": "CVE-2022-2819", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2819" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2845", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2845" }, { "cve": "CVE-2022-2849", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2849" }, { "cve": "CVE-2022-2862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2862" }, { "cve": "CVE-2022-2867", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2867" }, { "cve": "CVE-2022-2868", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2868" }, { "cve": "CVE-2022-2869", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2869" }, { "cve": "CVE-2022-28693", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28693" }, { "cve": "CVE-2022-2874", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2874" }, { "cve": "CVE-2022-28748", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28748" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-2889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2889" }, { "cve": "CVE-2022-29162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29162" }, { "cve": "CVE-2022-29187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29187" }, { "cve": "CVE-2022-2923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2923" }, { "cve": "CVE-2022-2946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2946" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29583", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29583" }, { "cve": "CVE-2022-2964", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2964" }, { "cve": "CVE-2022-2977", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2977" }, { "cve": "CVE-2022-2980", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2980" }, { "cve": "CVE-2022-2982", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2982" }, { "cve": "CVE-2022-29900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29901" }, { "cve": "CVE-2022-2991", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2991" }, { "cve": "CVE-2022-3016", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3016" }, { "cve": "CVE-2022-3028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3028" }, { "cve": "CVE-2022-3037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3037" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-3099", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3099" }, { "cve": "CVE-2022-31030", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31030" }, { "cve": "CVE-2022-31159", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31159" }, { "cve": "CVE-2022-3134", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3134" }, { "cve": "CVE-2022-3153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3153" }, { "cve": "CVE-2022-3169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3169" }, { "cve": "CVE-2022-31690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31690" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-3234", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3234" }, { "cve": "CVE-2022-3235", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3235" }, { "cve": "CVE-2022-3239", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3239" }, { "cve": "CVE-2022-3278", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3278" }, { "cve": "CVE-2022-3296", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3296" }, { "cve": "CVE-2022-3297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3297" }, { "cve": "CVE-2022-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33196" }, { "cve": "CVE-2022-3324", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3324" }, { "cve": "CVE-2022-3352", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3352" }, { "cve": "CVE-2022-33740", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33740" }, { "cve": "CVE-2022-33741", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33741" }, { "cve": "CVE-2022-33742", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33742" }, { "cve": "CVE-2022-33972", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33972" }, { "cve": "CVE-2022-33981", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33981" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3424" }, { "cve": "CVE-2022-34266", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34266" }, { "cve": "CVE-2022-34526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34526" }, { "cve": "CVE-2022-34903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34903" }, { "cve": "CVE-2022-3491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3491" }, { "cve": "CVE-2022-3515", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3515" }, { "cve": "CVE-2022-3520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3520" }, { "cve": "CVE-2022-3521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3521" }, { "cve": "CVE-2022-3524", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3524" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-3542", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3542" }, { "cve": "CVE-2022-3545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-3565", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3565" }, { "cve": "CVE-2022-3566", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3566" }, { "cve": "CVE-2022-3567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3567" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-3586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3586" }, { "cve": "CVE-2022-3591", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3591" }, { "cve": "CVE-2022-3594", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3594" }, { "cve": "CVE-2022-3597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3597" }, { "cve": "CVE-2022-3599", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3599" }, { "cve": "CVE-2022-36109", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36109" }, { "cve": "CVE-2022-3621", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3621" }, { "cve": "CVE-2022-3626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3626" }, { "cve": "CVE-2022-3627", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3627" }, { "cve": "CVE-2022-3628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3628" }, { "cve": "CVE-2022-36280", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36280" }, { "cve": "CVE-2022-3629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3629" }, { "cve": "CVE-2022-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3635" }, { "cve": "CVE-2022-3643", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3643" }, { "cve": "CVE-2022-36437", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36437" }, { "cve": "CVE-2022-3646", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3646" }, { "cve": "CVE-2022-3649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3649" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-36879", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36879" }, { "cve": "CVE-2022-36946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36946" }, { "cve": "CVE-2022-3705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3705" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-37865", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37865" }, { "cve": "CVE-2022-37866", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37866" }, { "cve": "CVE-2022-38090", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38090" }, { "cve": "CVE-2022-38096", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38096" }, { "cve": "CVE-2022-38126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38126" }, { "cve": "CVE-2022-38127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38127" }, { "cve": "CVE-2022-38177", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38177" }, { "cve": "CVE-2022-38178", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38178" }, { "cve": "CVE-2022-3821", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3821" }, { "cve": "CVE-2022-38533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38533" }, { "cve": "CVE-2022-38749", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38749" }, { "cve": "CVE-2022-38750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38750" }, { "cve": "CVE-2022-38751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38751" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-39028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39028" }, { "cve": "CVE-2022-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3903" }, { "cve": "CVE-2022-39188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39188" }, { "cve": "CVE-2022-39399", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39399" }, { "cve": "CVE-2022-3970", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3970" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-40150", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40150" }, { "cve": "CVE-2022-40151", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40151" }, { "cve": "CVE-2022-40152", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40152" }, { "cve": "CVE-2022-40153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40153" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40307" }, { "cve": "CVE-2022-40674", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40674" }, { "cve": "CVE-2022-40768", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40768" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-4095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4095" }, { "cve": "CVE-2022-41218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41218" }, { "cve": "CVE-2022-4129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4129" }, { "cve": "CVE-2022-4141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4141" }, { "cve": "CVE-2022-41717", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41717" }, { "cve": "CVE-2022-41721", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41721" }, { "cve": "CVE-2022-41848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41848" }, { "cve": "CVE-2022-41850", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41850" }, { "cve": "CVE-2022-41854", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41854" }, { "cve": "CVE-2022-41858", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41858" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-41903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41903" }, { "cve": "CVE-2022-41915", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41915" }, { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-41974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41974" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42010", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42010" }, { "cve": "CVE-2022-42011", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42011" }, { "cve": "CVE-2022-42012", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42012" }, { "cve": "CVE-2022-42328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42328" }, { "cve": "CVE-2022-42329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42329" }, { "cve": "CVE-2022-42703", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42703" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-42895", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42895" }, { "cve": "CVE-2022-42896", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42896" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-4292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4292" }, { "cve": "CVE-2022-4293", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4293" }, { "cve": "CVE-2022-42969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42969" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-43750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43750" }, { "cve": "CVE-2022-4378", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4378" }, { "cve": "CVE-2022-43945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43945" }, { "cve": "CVE-2022-43995", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43995" }, { "cve": "CVE-2022-4415", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4415" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-44638", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-44638" }, { "cve": "CVE-2022-45061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45688", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45688" }, { "cve": "CVE-2022-45884", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45884" }, { "cve": "CVE-2022-45885", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45885" }, { "cve": "CVE-2022-45886", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45919", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45919" }, { "cve": "CVE-2022-45934", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45934" }, { "cve": "CVE-2022-45939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45939" }, { "cve": "CVE-2022-4662", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4662" }, { "cve": "CVE-2022-46751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46751" }, { "cve": "CVE-2022-46908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46908" }, { "cve": "CVE-2022-47629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47629" }, { "cve": "CVE-2022-47929", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47929" }, { "cve": "CVE-2022-48281", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48281" }, { "cve": "CVE-2022-48337", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48337" }, { "cve": "CVE-2022-48339", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48339" }, { "cve": "CVE-2023-0045", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0045" }, { "cve": "CVE-2023-0049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0049" }, { "cve": "CVE-2023-0051", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0051" }, { "cve": "CVE-2023-0054", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0054" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0288", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0288" }, { "cve": "CVE-2023-0433", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0433" }, { "cve": "CVE-2023-0464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0512", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0512" }, { "cve": "CVE-2023-0590", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0590" }, { "cve": "CVE-2023-0597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0597" }, { "cve": "CVE-2023-0833", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0833" }, { "cve": "CVE-2023-1076", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1118", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1118" }, { "cve": "CVE-2023-1127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1127" }, { "cve": "CVE-2023-1170", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1170" }, { "cve": "CVE-2023-1175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1175" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1370" }, { "cve": "CVE-2023-1380", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1380" }, { "cve": "CVE-2023-1390", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1436" }, { "cve": "CVE-2023-1513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1513" }, { "cve": "CVE-2023-1611", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1611" }, { "cve": "CVE-2023-1670", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1670" }, { "cve": "CVE-2023-1855", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1855" }, { "cve": "CVE-2023-1989", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1989" }, { "cve": "CVE-2023-1990", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1990" }, { "cve": "CVE-2023-1998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1998" }, { "cve": "CVE-2023-20862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-20862" }, { "cve": "CVE-2023-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2124" }, { "cve": "CVE-2023-2162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2162" }, { "cve": "CVE-2023-2176", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2176" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-21835", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21835" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21930", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21930" }, { "cve": "CVE-2023-21937", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21937" }, { "cve": "CVE-2023-21938", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21938" }, { "cve": "CVE-2023-21939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21939" }, { "cve": "CVE-2023-2194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2194" }, { "cve": "CVE-2023-21954", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21954" }, { "cve": "CVE-2023-21967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21967" }, { "cve": "CVE-2023-21968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21968" }, { "cve": "CVE-2023-22490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22490" }, { "cve": "CVE-2023-2253", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2253" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-23454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23455" }, { "cve": "CVE-2023-23559", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23559" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-23946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23946" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-24532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24532" }, { "cve": "CVE-2023-24534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24534" }, { "cve": "CVE-2023-2483", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2483" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-2513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2513" }, { "cve": "CVE-2023-25193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25193" }, { "cve": "CVE-2023-25652", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25652" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-25809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25809" }, { "cve": "CVE-2023-25815", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25815" }, { "cve": "CVE-2023-26048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26048" }, { "cve": "CVE-2023-26049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26049" }, { "cve": "CVE-2023-2650", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2650" }, { "cve": "CVE-2023-26545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26545" }, { "cve": "CVE-2023-26604", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26604" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-27561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27561" }, { "cve": "CVE-2023-2828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2828" }, { "cve": "CVE-2023-28320", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28320" }, { "cve": "CVE-2023-28321", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28321" }, { "cve": "CVE-2023-28322", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28322" }, { "cve": "CVE-2023-28328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28486", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28486" }, { "cve": "CVE-2023-28487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28487" }, { "cve": "CVE-2023-28642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28642" }, { "cve": "CVE-2023-28772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28772" }, { "cve": "CVE-2023-28840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28840" }, { "cve": "CVE-2023-28841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28841" }, { "cve": "CVE-2023-28842", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28842" }, { "cve": "CVE-2023-29007", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29007" }, { "cve": "CVE-2023-29383", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29383" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29406", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29406" }, { "cve": "CVE-2023-29409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29409" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30630" }, { "cve": "CVE-2023-30772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30772" }, { "cve": "CVE-2023-31084", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31084" }, { "cve": "CVE-2023-3138", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3138" }, { "cve": "CVE-2023-31436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31436" }, { "cve": "CVE-2023-31484", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31484" }, { "cve": "CVE-2023-32269", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32269" }, { "cve": "CVE-2023-32697", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32697" }, { "cve": "CVE-2023-33264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-33264" }, { "cve": "CVE-2023-34034", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34034" }, { "cve": "CVE-2023-34035", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34035" }, { "cve": "CVE-2023-34453", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34453" }, { "cve": "CVE-2023-34454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34454" }, { "cve": "CVE-2023-34455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34455" }, { "cve": "CVE-2023-34462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34462" }, { "cve": "CVE-2023-35116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-35116" }, { "cve": "CVE-2023-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3635" }, { "cve": "CVE-2023-36479", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-36479" }, { "cve": "CVE-2023-39533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-39533" }, { "cve": "CVE-2023-40167", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40167" }, { "cve": "CVE-2023-40217", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40217" }, { "cve": "CVE-2023-41105", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41105" }, { "cve": "CVE-2023-41900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41900" }, { "cve": "CVE-2023-43642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43642" }, { "cve": "CVE-2023-43804", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43804" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-45803", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-45803" }, { "cve": "CVE-2024-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2024-21626" } ] }
gsd-2023-1390
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2023-1390", "id": "GSD-2023-1390" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-1390" ], "details": "A remote denial of service vulnerability was found in the Linux kernel\u2019s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "id": "GSD-2023-1390", "modified": "2023-12-13T01:20:42.082932Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2023-1390", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Linux kernel (TIPC kernel module)", "version": { "version_data": [ { "version_value": "Fixed in kernel 5.11-rc4" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A remote denial of service vulnerability was found in the Linux kernel\u2019s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-1050" } ] } ] }, "references": { "reference_data": [ { "name": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5", "refsource": "MISC", "url": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5" }, { "name": "https://infosec.exchange/@_mattata/109427999461122360", "refsource": "MISC", "url": "https://infosec.exchange/@_mattata/109427999461122360" }, { "name": "https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6", "refsource": "MISC", "url": "https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6" }, { "name": "https://security.netapp.com/advisory/ntap-20230420-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20230420-0001/" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.11:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.11:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.11:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.9.253", "versionStartIncluding": "4.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.14.217", "versionStartIncluding": "4.10", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.19.170", "versionStartIncluding": "4.15", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.4.92", "versionStartIncluding": "4.20", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.10.10", "versionStartIncluding": "5.5", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2023-1390" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A remote denial of service vulnerability was found in the Linux kernel\u2019s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6", "refsource": "MISC", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6" }, { "name": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5" }, { "name": "https://infosec.exchange/@_mattata/109427999461122360", "refsource": "MISC", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://infosec.exchange/@_mattata/109427999461122360" }, { "name": "https://security.netapp.com/advisory/ntap-20230420-0001/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20230420-0001/" } ] } }, "impact": { "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2023-06-07T12:46Z", "publishedDate": "2023-03-16T21:15Z" } } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.