rhsa-2019_3309
Vulnerability from csaf_redhat
Published
2019-11-05 20:44
Modified
2024-11-05 21:32
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update

Notes

Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: nfs: use-after-free in svc_process_common() (CVE-2018-16884) * Kernel: vhost_net: infinite loop while receiving packets leads to DoS (CVE-2019-3900) * Kernel: page cache side channel attacks (CVE-2019-5489) * hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) (CVE-2019-9506) * kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c (CVE-2019-10126) * Kernel: KVM: OOB memory access via mmio ring buffer (CVE-2019-14821) * kernel: Information Disclosure in crypto_report_one in crypto/crypto_user.c (CVE-2018-19854) * kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS (CVE-2018-20169) * kernel: Heap address information leak while using L2CAP_GET_CONF_OPT (CVE-2019-3459) * kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP (CVE-2019-3460) * kernel: SCTP socket buffer memory leak leading to denial of service (CVE-2019-3874) * kernel: denial of service vector through vfio DMA mappings (CVE-2019-3882) * kernel: null-pointer dereference in hci_uart_set_flow_control (CVE-2019-10207) * kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping (CVE-2019-11599) * kernel: fs/ext4/extents.c leads to information disclosure (CVE-2019-11833) * kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command (CVE-2019-11884) * kernel: use-after-free in arch/x86/lib/insn-eval.c (CVE-2019-13233) * kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service (CVE-2019-15916) * kernel: oob memory read in hso_probe in drivers/net/usb/hso.c (CVE-2018-19985) * Kernel: KVM: leak of uninitialized stack contents to guest (CVE-2019-7222) * Kernel: net: weak IP ID generation leads to remote device tracking (CVE-2019-10638) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: nfs: use-after-free in svc_process_common() (CVE-2018-16884)\n\n* Kernel: vhost_net: infinite loop while receiving packets leads to DoS (CVE-2019-3900)\n\n* Kernel: page cache side channel attacks (CVE-2019-5489)\n\n* hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) (CVE-2019-9506)\n\n* kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c (CVE-2019-10126)\n\n* Kernel: KVM: OOB memory access via mmio ring buffer (CVE-2019-14821)\n\n* kernel: Information Disclosure in crypto_report_one in crypto/crypto_user.c (CVE-2018-19854)\n\n* kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS (CVE-2018-20169)\n\n* kernel: Heap address information leak while using L2CAP_GET_CONF_OPT (CVE-2019-3459)\n\n* kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP (CVE-2019-3460)\n\n* kernel: SCTP socket buffer memory leak leading to denial of service (CVE-2019-3874)\n\n* kernel: denial of service vector through vfio DMA mappings (CVE-2019-3882)\n\n* kernel: null-pointer dereference in hci_uart_set_flow_control (CVE-2019-10207)\n\n* kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping (CVE-2019-11599)\n\n* kernel: fs/ext4/extents.c leads to information disclosure (CVE-2019-11833)\n\n* kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command (CVE-2019-11884)\n\n* kernel: use-after-free in arch/x86/lib/insn-eval.c (CVE-2019-13233)\n\n* kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service (CVE-2019-15916)\n\n* kernel: oob memory read in hso_probe in drivers/net/usb/hso.c (CVE-2018-19985)\n\n* Kernel: KVM: leak of uninitialized stack contents to guest (CVE-2019-7222)\n\n* Kernel: net: weak IP ID generation leads to remote device tracking (CVE-2019-10638)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2019:3309",
        "url": "https://access.redhat.com/errata/RHSA-2019:3309"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.1_release_notes/",
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.1_release_notes/"
      },
      {
        "category": "external",
        "summary": "1656986",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656986"
      },
      {
        "category": "external",
        "summary": "1660375",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660375"
      },
      {
        "category": "external",
        "summary": "1660385",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660385"
      },
      {
        "category": "external",
        "summary": "1663176",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663176"
      },
      {
        "category": "external",
        "summary": "1663179",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663179"
      },
      {
        "category": "external",
        "summary": "1664110",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664110"
      },
      {
        "category": "external",
        "summary": "1666106",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666106"
      },
      {
        "category": "external",
        "summary": "1671930",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671930"
      },
      {
        "category": "external",
        "summary": "1678887",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1678887"
      },
      {
        "category": "external",
        "summary": "1686373",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1686373"
      },
      {
        "category": "external",
        "summary": "1689426",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1689426"
      },
      {
        "category": "external",
        "summary": "1698757",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1698757"
      },
      {
        "category": "external",
        "summary": "1700666",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1700666"
      },
      {
        "category": "external",
        "summary": "1705937",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705937"
      },
      {
        "category": "external",
        "summary": "1709837",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709837"
      },
      {
        "category": "external",
        "summary": "1712072",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1712072"
      },
      {
        "category": "external",
        "summary": "1716992",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1716992"
      },
      {
        "category": "external",
        "summary": "1724657",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724657"
      },
      {
        "category": "external",
        "summary": "1727756",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1727756"
      },
      {
        "category": "external",
        "summary": "1727857",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1727857"
      },
      {
        "category": "external",
        "summary": "1728765",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728765"
      },
      {
        "category": "external",
        "summary": "1729931",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729931"
      },
      {
        "category": "external",
        "summary": "1733472",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1733472"
      },
      {
        "category": "external",
        "summary": "1733874",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1733874"
      },
      {
        "category": "external",
        "summary": "1743931",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743931"
      },
      {
        "category": "external",
        "summary": "1745646",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1745646"
      },
      {
        "category": "external",
        "summary": "1746708",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746708"
      },
      {
        "category": "external",
        "summary": "1750813",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1750813"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3309.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
    "tracking": {
      "current_release_date": "2024-11-05T21:32:29+00:00",
      "generator": {
        "date": "2024-11-05T21:32:29+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.1.1"
        }
      },
      "id": "RHSA-2019:3309",
      "initial_release_date": "2019-11-05T20:44:12+00:00",
      "revision_history": [
        {
          "date": "2019-11-05T20:44:12+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-05T20:44:12+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-05T21:32:29+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
                  "product_id": "NFV-8.1.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Real Time (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux Real Time (v. 8)",
                  "product_id": "RT-8.1.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
                "product": {
                  "name": "kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_id": "kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-147.rt24.93.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
                "product": {
                  "name": "kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_id": "kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-147.rt24.93.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_id": "kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-147.rt24.93.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_id": "kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-147.rt24.93.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-147.rt24.93.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_id": "kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-147.rt24.93.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_id": "kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-147.rt24.93.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-147.rt24.93.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_id": "kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-147.rt24.93.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
                "product": {
                  "name": "kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_id": "kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-147.rt24.93.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
                "product": {
                  "name": "kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_id": "kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-147.rt24.93.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
                "product": {
                  "name": "kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_id": "kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-147.rt24.93.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-147.rt24.93.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_id": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@4.18.0-147.rt24.93.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-147.rt24.93.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-147.rt24.93.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
                "product": {
                  "name": "kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_id": "kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@4.18.0-147.rt24.93.el8?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:4.18.0-147.rt24.93.el8.src",
                "product": {
                  "name": "kernel-rt-0:4.18.0-147.rt24.93.el8.src",
                  "product_id": "kernel-rt-0:4.18.0-147.rt24.93.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-147.rt24.93.el8?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-147.rt24.93.el8.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src"
        },
        "product_reference": "kernel-rt-0:4.18.0-147.rt24.93.el8.src",
        "relates_to_product_reference": "NFV-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "NFV-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "NFV-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "NFV-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "NFV-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "NFV-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "NFV-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "NFV-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "NFV-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "NFV-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "NFV-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "NFV-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "NFV-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "NFV-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "NFV-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "NFV-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "NFV-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "NFV-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-147.rt24.93.el8.src as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src"
        },
        "product_reference": "kernel-rt-0:4.18.0-147.rt24.93.el8.src",
        "relates_to_product_reference": "RT-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "RT-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "RT-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "RT-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "RT-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "RT-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "RT-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "RT-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "RT-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "RT-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "RT-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "RT-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "RT-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "RT-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "RT-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "RT-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "RT-8.1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
        },
        "product_reference": "kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
        "relates_to_product_reference": "RT-8.1.0"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Evgenii Shatokhin",
            "Vasily Averin"
          ],
          "organization": "Virtuozzo"
        }
      ],
      "cve": "CVE-2018-16884",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2018-12-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1660375"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: nfs: use-after-free in svc_process_common()",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-16884"
        },
        {
          "category": "external",
          "summary": "RHBZ#1660375",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660375"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-16884",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-16884"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16884",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16884"
        }
      ],
      "release_date": "2018-11-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-05T20:44:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2019:3309"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: nfs: use-after-free in svc_process_common()"
    },
    {
      "cve": "CVE-2018-19854",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2018-12-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1656986"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in the Linux kernel in the crypto_report_one() and related functions in the crypto/crypto_user.c (the crypto user configuration API) which do not fully initialize structures that are copied to userspace, potentially leaking sensitive kernel memory content to a userspace.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Information Disclosure in crypto_report_one in crypto/crypto_user.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-19854"
        },
        {
          "category": "external",
          "summary": "RHBZ#1656986",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656986"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-19854",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-19854"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19854",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19854"
        }
      ],
      "release_date": "2018-11-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-05T20:44:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2019:3309"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Information Disclosure in crypto_report_one in crypto/crypto_user.c"
    },
    {
      "cve": "CVE-2018-19985",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2019-01-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1666106"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel in the function hso_probe() which reads if_num value from the USB device (as an u8) and uses it without a length check to index an array, resulting in an OOB memory read in hso_probe() or hso_get_config_data(). An attacker with a forged USB device and physical access to a system (needed to connect such a device) can cause a system crash and a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: oob memory read in hso_probe in drivers/net/usb/hso.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-19985"
        },
        {
          "category": "external",
          "summary": "RHBZ#1666106",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666106"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-19985",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-19985"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19985",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19985"
        }
      ],
      "release_date": "2018-12-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-05T20:44:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2019:3309"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: oob memory read in hso_probe in drivers/net/usb/hso.c"
    },
    {
      "cve": "CVE-2018-20169",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2018-12-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1660385"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in the Linux kernel\u0027s USB subsystem in the __usb_get_extra_descriptor() function in the drivers/usb/core/usb.c which mishandles a size check during the reading of an extra descriptor data. By using a specially crafted USB device which sends a forged extra descriptor, an unprivileged user with physical access to the system can potentially cause a  privilege escalation or trigger a system crash or lock up and thus to cause a denial of service (DoS).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-20169"
        },
        {
          "category": "external",
          "summary": "RHBZ#1660385",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660385"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-20169",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-20169"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-20169",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20169"
        }
      ],
      "release_date": "2018-12-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-05T20:44:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2019:3309"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS"
    },
    {
      "cve": "CVE-2019-3459",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-01-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1663176"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s implementation of Logical Link Control and Adaptation Protocol (L2CAP), part of the Bluetooth stack. An attacker, within the range of standard Bluetooth transmissions, can create and send a specially crafted packet. The response to this specially crafted packet can contain part of the kernel stack which can be used in a further attack.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Heap address information leak while using L2CAP_GET_CONF_OPT",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-3459"
        },
        {
          "category": "external",
          "summary": "RHBZ#1663176",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663176"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3459",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-3459"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3459",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3459"
        }
      ],
      "release_date": "2019-01-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-05T20:44:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2019:3309"
        },
        {
          "category": "workaround",
          "details": "- Disabling the bluetooth hardware in the bios.\n- Prevent loading of the bluetooth kernel modules.\n- Disable the bluetooth connection by putting the system in \"airport\" mode.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Heap address information leak while using L2CAP_GET_CONF_OPT"
    },
    {
      "cve": "CVE-2019-3460",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-01-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1663179"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_parse_conf_rsp and l2cap_parse_conf_req functions. An attacker with physical access within the range of standard Bluetooth transmission can create a specially crafted packet. The response to this specially crafted packet can contain part of the kernel stack which can be used in a further attack.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-3460"
        },
        {
          "category": "external",
          "summary": "RHBZ#1663179",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663179"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3460",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-3460"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3460",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3460"
        }
      ],
      "release_date": "2019-01-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-05T20:44:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2019:3309"
        },
        {
          "category": "workaround",
          "details": "- Disabling the bluetooth hardware in the bios.\n- Prevent loading of the bluetooth kernel modules.\n- Disable the bluetooth connection by putting the system in \"airport\" mode.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Andrea Spagnolo",
            "Matteo Croce",
            "Natale Vinto"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2019-3874",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-03-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1686373"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SCTP socket buffer memory leak leading to denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "While this issue affects the Linux Kernel in Red Hat Enterprise Linux, and not OpenShift Container Platform (OCP) 3 code directly. OCP 3 makes use of CGroups in the Kernel to measure and report on the amount of system resources used by an end user application.\n\nThe default Security Context Constraints (SCC) in OpenShift Container Platform 3.x disallow an end user from running a container as root. Also a check is performed by the OCP 3 Installer to ensure SELinux is enabled, [1].\n\n[1] https://github.com/openshift/openshift-ansible/blob/006fb14e9a28df9bd1a58ac376bbdf3eba50fa51/roles/openshift_node/tasks/main.yml#L3",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-3874"
        },
        {
          "category": "external",
          "summary": "RHBZ#1686373",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1686373"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3874",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-3874"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3874",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3874"
        },
        {
          "category": "external",
          "summary": "https://discuss.kubernetes.io/t/kubernetes-security-announcement-linux-kernel-memory-cgroups-escape-via-sctp-cve-2019-3874/5594",
          "url": "https://discuss.kubernetes.io/t/kubernetes-security-announcement-linux-kernel-memory-cgroups-escape-via-sctp-cve-2019-3874/5594"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/netdev/20190401113110.GA20717@hmswarspite.think-freely.org/T/#u",
          "url": "https://lore.kernel.org/netdev/20190401113110.GA20717@hmswarspite.think-freely.org/T/#u"
        }
      ],
      "release_date": "2019-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-05T20:44:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2019:3309"
        },
        {
          "category": "workaround",
          "details": "SELinux prevents a bind of the SCTP socket by a non-root user. \n\nTo mitigate this issue if not using SELinux, or if a Security Context Constraint allows running pods as the root user the \u0027sctp\u0027 module should be blacklisted. Please this this Knowledge Base article for more information on how to blacklist a kernel module. https://access.redhat.com/solutions/41278",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SCTP socket buffer memory leak leading to denial of service"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Alex Williamson"
          ],
          "organization": "Red Hat Inc.",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2019-3882",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1689426"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s vfio interface implementation that permits violation of the user\u0027s locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: denial of service vector through vfio DMA mappings",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-3882"
        },
        {
          "category": "external",
          "summary": "RHBZ#1689426",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1689426"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3882",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-3882"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3882",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3882"
        }
      ],
      "release_date": "2019-04-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-05T20:44:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2019:3309"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: denial of service vector through vfio DMA mappings"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Jason Wang"
          ],
          "organization": "Red Hat Inc.",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2019-3900",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "discovery_date": "2019-04-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1698757"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An infinite loop issue was found in the vhost_net kernel module while handling incoming packets in handle_rx(). The infinite loop could occur if one end sends packets faster than the other end can process them. A guest user, maybe a remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Kernel: vhost_net: infinite loop while receiving packets leads to DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of Linux kernel as shipped with Red Hat Enterprise Linux 6 and 7. Future kernel updates for Red Hat Enterprise Linux 6 and 7 may address this issue.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-3900"
        },
        {
          "category": "external",
          "summary": "RHBZ#1698757",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1698757"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3900",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-3900"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3900",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3900"
        }
      ],
      "release_date": "2019-04-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-05T20:44:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2019:3309"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "Kernel: vhost_net: infinite loop while receiving packets leads to DoS"
    },
    {
      "cve": "CVE-2019-5489",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-01-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1664110"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A new software page cache side channel attack scenario was discovered in operating systems that implement the very common \u0027page cache\u0027 caching mechanism. A malicious user/process could use \u0027in memory\u0027 page-cache knowledge to infer access timings to shared memory and gain knowledge which can be used to reduce effectiveness of cryptographic strength by monitoring algorithmic behavior, infer access patterns of memory to determine code paths taken, and exfiltrate data to a blinded attacker through page-granularity access times as a side-channel.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Kernel: page cache side channel attacks",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-5489"
        },
        {
          "category": "external",
          "summary": "RHBZ#1664110",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664110"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5489",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-5489"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5489",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5489"
        }
      ],
      "release_date": "2019-01-06T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-05T20:44:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2019:3309"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N",
            "version": "3.0"
          },
          "products": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "Kernel: page cache side channel attacks"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Felix Wilhelm"
          ],
          "organization": "Google"
        }
      ],
      "cve": "CVE-2019-7222",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-01-29T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1671930"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An information leakage issue was found in the way Linux kernel\u0027s KVM hypervisor handled page fault exceptions while emulating instructions like VMXON, VMCLEAR, VMPTRLD, and VMWRITE with memory address as an operand. It occurs if the operand is a mmio address, as the returned exception object holds uninitialized stack memory contents. A guest user/process could use this flaw to leak host\u0027s stack memory contents to a guest.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Kernel: KVM: leak of uninitialized stack contents to guest",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue does not affect the version of the kernel package as shipped with Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG 2.\n\nThis issue affects the versions of Linux kernel as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7 may address this issue.\n\nNote:- Impact on Red Hat Enterprise Linux 7 kernel is limited, as it requires that nested virtualization feature is enabled on a system. Nested Virtualization feature is available only as - Technology Preview.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-7222"
        },
        {
          "category": "external",
          "summary": "RHBZ#1671930",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671930"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-7222",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-7222"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-7222",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-7222"
        }
      ],
      "release_date": "2019-02-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-05T20:44:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2019:3309"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 2.8,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "Kernel: KVM: leak of uninitialized stack contents to guest"
    },
    {
      "cve": "CVE-2019-9506",
      "cwe": {
        "id": "CWE-327",
        "name": "Use of a Broken or Risky Cryptographic Algorithm"
      },
      "discovery_date": "2019-06-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1727857"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in the Bluetooth protocol.  An attacker within physical proximity to the Bluetooth connection could downgrade the encryption protocol to be trivially brute forced.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-9506"
        },
        {
          "category": "external",
          "summary": "RHBZ#1727857",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1727857"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9506",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-9506"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9506",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9506"
        }
      ],
      "release_date": "2019-08-10T09:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-05T20:44:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2019:3309"
        },
        {
          "category": "workaround",
          "details": "At this time there is no known mitigation if bluetooth hardware is to be continue to be used.   Replacing the hardware with its wired version and disabling bluetooth may be a suitable alternative for some environments.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB)"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "huangwen"
          ],
          "organization": "ADLab of Venustech"
        }
      ],
      "cve": "CVE-2019-10126",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "discovery_date": "2019-05-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1716992"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the mwifiex implementation in the Linux kernel. A system connecting to wireless access point could be manipulated by an attacker with advanced permissions on the access point into localized memory corruption or possibly privilege escalation.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-10126"
        },
        {
          "category": "external",
          "summary": "RHBZ#1716992",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1716992"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10126",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-10126"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10126",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10126"
        }
      ],
      "release_date": "2019-05-31T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-05T20:44:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2019:3309"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c"
    },
    {
      "cve": "CVE-2019-10207",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2019-07-25T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1733874"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s Bluetooth implementation of UART. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: null-pointer dereference in hci_uart_set_flow_control",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-10207"
        },
        {
          "category": "external",
          "summary": "RHBZ#1733874",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1733874"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10207",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-10207"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10207",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10207"
        }
      ],
      "release_date": "2019-07-29T13:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-05T20:44:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2019:3309"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: null-pointer dereference in hci_uart_set_flow_control"
    },
    {
      "cve": "CVE-2019-10638",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-07-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1729931"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the Linux kernel derived the IP ID field from a partial kernel space address returned by a net_hash_mix() function. A remote user could observe a weak IP ID generation in this field to track Linux devices.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Kernel: net: weak IP ID generation leads to remote device tracking",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6.\n\nThis issue affects the version of Linux kernel as shipped with Red Hat Enterprise Linux 7,  8 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 7, 8 and Red Hat Enterprise MRG 2 may address this issue.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-10638"
        },
        {
          "category": "external",
          "summary": "RHBZ#1729931",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729931"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10638",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-10638"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10638",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10638"
        },
        {
          "category": "external",
          "summary": "https://arxiv.org/pdf/1906.10478.pdf",
          "url": "https://arxiv.org/pdf/1906.10478.pdf"
        }
      ],
      "release_date": "2019-07-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-05T20:44:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2019:3309"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "Kernel: net: weak IP ID generation leads to remote device tracking"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Andrea Arcangeli"
          ],
          "organization": "Red Hat Engineering",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2019-11599",
      "cwe": {
        "id": "CWE-667",
        "name": "Improper Locking"
      },
      "discovery_date": "2019-04-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1705937"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel where the coredump implementation does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs. This allows local users to obtain sensitive information, cause a denial of service (DoS), or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-11599"
        },
        {
          "category": "external",
          "summary": "RHBZ#1705937",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705937"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11599",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-11599"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11599",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11599"
        }
      ],
      "release_date": "2019-04-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-05T20:44:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2019:3309"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping"
    },
    {
      "cve": "CVE-2019-11833",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-05-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1712072"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s implementation of ext4 extent management. The kernel doesn\u0027t correctly initialize memory regions in the extent tree block which may be exported to a local user to obtain sensitive information by reading empty/uninitialized data from the filesystem.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: fs/ext4/extents.c leads to information disclosure",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This is a possible information leak of data that existed in the extent tree blocks.  While the attacker does not have control of what exists in the blocks prior to this point they may be able to glean confidential information or possibly information that could be used to further another attack.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-11833"
        },
        {
          "category": "external",
          "summary": "RHBZ#1712072",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1712072"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11833",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-11833"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11833",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11833"
        }
      ],
      "release_date": "2019-05-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-05T20:44:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2019:3309"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: fs/ext4/extents.c leads to information disclosure"
    },
    {
      "cve": "CVE-2019-11884",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-05-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1709837"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s implementation of the Bluetooth Human Interface Device Protocol (HIDP). A local attacker with access permissions to the Bluetooth device can issue an IOCTL which will trigger the do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c.c. This function can leak potentially sensitive information from the kernel stack memory via a HIDPCONNADD command because a name field may not be correctly NULL terminated.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-11884"
        },
        {
          "category": "external",
          "summary": "RHBZ#1709837",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709837"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11884",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-11884"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11884",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11884"
        }
      ],
      "release_date": "2019-05-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-05T20:44:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2019:3309"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command"
    },
    {
      "cve": "CVE-2019-13233",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-07-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1727756"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in the arch/x86/lib/insn-eval.c function in the Linux kernel. An attacker could corrupt the memory due to a flaw in use-after-free access to an LDT entry caused by a race condition between modify_ldt() and a #BR exception for an MPX bounds violation.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in arch/x86/lib/insn-eval.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-13233"
        },
        {
          "category": "external",
          "summary": "RHBZ#1727756",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1727756"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13233",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-13233"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13233",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13233"
        }
      ],
      "release_date": "2019-07-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-05T20:44:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2019:3309"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.0"
          },
          "products": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in arch/x86/lib/insn-eval.c"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Matt Delco"
          ],
          "organization": "Google.com"
        }
      ],
      "cve": "CVE-2019-14821",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2019-08-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1746708"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds access issue was found in the way Linux kernel\u0027s KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer \u0027struct kvm_coalesced_mmio\u0027 object, wherein write indices \u0027ring-\u003efirst\u0027 and \u0027ring-\u003elast\u0027 value could be supplied by a host user-space process. An unprivileged host user or process with access to \u0027/dev/kvm\u0027 device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Kernel: KVM: OOB memory access via mmio ring buffer",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue requires unprivileged users to have access to \u0027/dev/kvm\u0027 device. So restricting access to \u0027/dev/kvm\u0027 device to known trusted users could limit its exploitation by untrusted users/processes.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-14821"
        },
        {
          "category": "external",
          "summary": "RHBZ#1746708",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746708"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14821",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14821",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14821"
        }
      ],
      "release_date": "2019-09-17T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-05T20:44:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2019:3309"
        },
        {
          "category": "workaround",
          "details": "Restrict access to the \u0027/dev/kvm\u0027 device to trusted users.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "Kernel: KVM: OOB memory access via mmio ring buffer"
    },
    {
      "cve": "CVE-2019-15666",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-08-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1747334"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. When xfrm policy removal occurs a system crash could occur. These policy changes generally occur through the ip command or a netlink socket.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds array access in __xfrm_policy_unlink",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "A local privileged user (with CAP_NET_ADMIN or root) is required to exploit this condition. With this limitation, this issue is rated as Moderate.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-15666"
        },
        {
          "category": "external",
          "summary": "RHBZ#1747334",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1747334"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15666",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-15666"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15666",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15666"
        }
      ],
      "release_date": "2019-08-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-05T20:44:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2019:3309"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds array access in __xfrm_policy_unlink"
    },
    {
      "cve": "CVE-2019-15916",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-09-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1750813"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw that allowed an attacker to leak kernel memory was found in the network subsystem where an attacker with permissions to create tun/tap devices can create a denial of service and panic the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-15916"
        },
        {
          "category": "external",
          "summary": "RHBZ#1750813",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1750813"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15916",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-15916"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15916",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15916"
        }
      ],
      "release_date": "2019-09-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-05T20:44:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2019:3309"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service"
    },
    {
      "cve": "CVE-2019-15921",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2019-10-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1760958"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the genl_register_family function in the Linux kernel. An attacker able to induce the error conditions could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory leak in genl_register_family() in net/netlink/genetlink.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error/resource cleanup code path (system-wide out-of-memory condition, high privileges or physical access). The generic netlink is a way for kernel modues to easily communicate with userspace using netlink. genl_register_family is thus called by kernel modules (code) only and it\u0027s hard for an attacker to invoke (module reloads?) it let alone fail on the right place.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-15921"
        },
        {
          "category": "external",
          "summary": "RHBZ#1760958",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760958"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15921",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-15921"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15921",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15921"
        }
      ],
      "release_date": "2019-09-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-05T20:44:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2019:3309"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: memory leak in genl_register_family() in net/netlink/genetlink.c"
    },
    {
      "cve": "CVE-2019-15924",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2019-10-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1763869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the fm10k driver in the Linux kernel reacted to memory-related errors during driver initialization. This flaw allows a local attacker to cause a denial of service and crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: null pointer dereference in drivers/net/ethernet/intel/fm10k/fm10k_main.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the low memory conditions needed to trigger this issue.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-15924"
        },
        {
          "category": "external",
          "summary": "RHBZ#1763869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763869"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15924",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-15924"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15924",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15924"
        }
      ],
      "release_date": "2019-09-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-05T20:44:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2019:3309"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent module fm10k from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: null pointer dereference in drivers/net/ethernet/intel/fm10k/fm10k_main.c"
    },
    {
      "cve": "CVE-2019-16994",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-09-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1759681"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the sit_init_net function in the Linux kernel handled resource cleanup on errors. This flaw allows an attacker to use the error conditions to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Memory leak in sit_init_net() in net/ipv6/sit.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error/resource cleanup code path (system-wide out-of-memory condition, high privileges or physical access).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-16994"
        },
        {
          "category": "external",
          "summary": "RHBZ#1759681",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759681"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16994",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-16994"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16994",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16994"
        }
      ],
      "release_date": "2019-09-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-05T20:44:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2019:3309"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: Memory leak in sit_init_net() in net/ipv6/sit.c"
    },
    {
      "cve": "CVE-2020-10720",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-12-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1781204"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s implementation of GRO. This flaw allows an attacker with local access to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free read in napi_gro_frags() in the Linux kernel",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Moderate impact because it appears to be limited to only to a crash.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
          "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
          "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-10720"
        },
        {
          "category": "external",
          "summary": "RHBZ#1781204",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781204"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10720",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-10720"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10720",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10720"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4270d6795b0580287453ea55974d948393e66ef",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4270d6795b0580287453ea55974d948393e66ef"
        }
      ],
      "release_date": "2019-12-09T14:23:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-05T20:44:12+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2019:3309"
        },
        {
          "category": "workaround",
          "details": "Disabling GSO on the cards using ethtool will prevent this codepath from being taken.",
          "product_ids": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "NFV-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "NFV-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.src",
            "RT-8.1.0:kernel-rt-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-core-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debug-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-devel-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-kvm-debuginfo-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-0:4.18.0-147.rt24.93.el8.x86_64",
            "RT-8.1.0:kernel-rt-modules-extra-0:4.18.0-147.rt24.93.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free read in napi_gro_frags() in the Linux kernel"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.