rhsa-2022_7444
Vulnerability from csaf_redhat
Published
2022-11-08 09:25
Modified
2024-11-06 01:55
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update

Notes

Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * off-path attacker may inject data or terminate victim's TCP session (CVE-2020-36516) * Race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference (CVE-2020-36558) * use-after-free vulnerability in function sco_sock_sendmsg() (CVE-2021-3640) * Memory leak for large arguments in video_usercopy function in drivers/media/v4l2-core/v4l2-ioctl.c (CVE-2021-30002) * smb2_ioctl_query_info NULL Pointer Dereference (CVE-2022-0168) * NULL pointer dereference in udf_expand_file_adinicbdue() during writeback (CVE-2022-0617) * swiotlb information leak with DMA_FROM_DEVICE (CVE-2022-0854) * Uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM (CVE-2022-1016) * Race condition in snd_pcm_hw_free leading to use-after-free (CVE-2022-1048) * use-after-free in tc_new_tfilter() in net/sched/cls_api.c (CVE-2022-1055) * use-after-free and memory errors in ext4 when mounting and operating on a corrupted image (CVE-2022-1184) * NULL pointer dereference in x86_emulate_insn may lead to DoS (CVE-2022-1852) * buffer overflow in nft_set_desc_concat_parse() (CVE-2022-2078) * nf_tables cross-table potential use-after-free may lead to local privilege escalation (CVE-2022-2586) * openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639) * use-after-free when psi trigger is destroyed while being polled (CVE-2022-2938) * net/packet: slab-out-of-bounds access in packet_recvmsg() (CVE-2022-20368) * possible to use the debugger to write zero into a location of choice (CVE-2022-21499) * Post-barrier Return Stack Buffer Predictions (CVE-2022-26373) * Memory leak in drivers/hid/hid-elo.c (CVE-2022-27950) * Double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c (CVE-2022-28390) * Use after free in SUNRPC subsystem (CVE-2022-28893) * use-after-free due to improper update of reference count in net/sched/cls_u32.c (CVE-2022-29581) * DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c (CVE-2022-36946) * nfs_atomic_open() returns uninitialized data instead of ENOTDIR (CVE-2022-24448) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* off-path attacker may inject data or terminate victim\u0027s TCP session (CVE-2020-36516)\n\n* Race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference (CVE-2020-36558)\n\n* use-after-free vulnerability in function sco_sock_sendmsg() (CVE-2021-3640)\n\n* Memory leak for large arguments in video_usercopy function in drivers/media/v4l2-core/v4l2-ioctl.c (CVE-2021-30002)\n\n* smb2_ioctl_query_info NULL Pointer Dereference (CVE-2022-0168)\n\n* NULL pointer dereference in udf_expand_file_adinicbdue() during writeback (CVE-2022-0617)\n\n* swiotlb information leak with DMA_FROM_DEVICE (CVE-2022-0854)\n\n* Uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM (CVE-2022-1016)\n\n* Race condition in snd_pcm_hw_free leading to use-after-free (CVE-2022-1048)\n\n* use-after-free in tc_new_tfilter() in net/sched/cls_api.c (CVE-2022-1055)\n\n* use-after-free and memory errors in ext4 when mounting and operating on a corrupted image (CVE-2022-1184)\n\n* NULL pointer dereference in x86_emulate_insn may lead to DoS (CVE-2022-1852)\n\n* buffer overflow in nft_set_desc_concat_parse() (CVE-2022-2078)\n\n* nf_tables cross-table potential use-after-free may lead to local privilege escalation (CVE-2022-2586)\n\n* openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639)\n\n* use-after-free when psi trigger is destroyed while being polled (CVE-2022-2938)\n\n* net/packet: slab-out-of-bounds access in packet_recvmsg() (CVE-2022-20368)\n\n* possible to use the debugger to write zero into a location of choice (CVE-2022-21499)\n\n* Post-barrier Return Stack Buffer Predictions (CVE-2022-26373)\n\n* Memory leak in drivers/hid/hid-elo.c (CVE-2022-27950)\n\n* Double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c (CVE-2022-28390)\n\n* Use after free in SUNRPC subsystem (CVE-2022-28893)\n\n* use-after-free due to improper update of reference count in net/sched/cls_u32.c (CVE-2022-29581)\n\n* DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c (CVE-2022-36946)\n\n* nfs_atomic_open() returns uninitialized data instead of ENOTDIR (CVE-2022-24448)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:7444",
        "url": "https://access.redhat.com/errata/RHSA-2022:7444"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index",
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/6971358",
        "url": "https://access.redhat.com/solutions/6971358"
      },
      {
        "category": "external",
        "summary": "1946279",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946279"
      },
      {
        "category": "external",
        "summary": "1980646",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980646"
      },
      {
        "category": "external",
        "summary": "2037386",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037386"
      },
      {
        "category": "external",
        "summary": "2037769",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037769"
      },
      {
        "category": "external",
        "summary": "2051444",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051444"
      },
      {
        "category": "external",
        "summary": "2053632",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053632"
      },
      {
        "category": "external",
        "summary": "2058395",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2058395"
      },
      {
        "category": "external",
        "summary": "2059928",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2059928"
      },
      {
        "category": "external",
        "summary": "2066614",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066614"
      },
      {
        "category": "external",
        "summary": "2066706",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066706"
      },
      {
        "category": "external",
        "summary": "2069408",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069408"
      },
      {
        "category": "external",
        "summary": "2070205",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2070205"
      },
      {
        "category": "external",
        "summary": "2070220",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2070220"
      },
      {
        "category": "external",
        "summary": "2073064",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073064"
      },
      {
        "category": "external",
        "summary": "2074208",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074208"
      },
      {
        "category": "external",
        "summary": "2084183",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084183"
      },
      {
        "category": "external",
        "summary": "2084479",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084479"
      },
      {
        "category": "external",
        "summary": "2088021",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088021"
      },
      {
        "category": "external",
        "summary": "2089815",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089815"
      },
      {
        "category": "external",
        "summary": "2096178",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096178"
      },
      {
        "category": "external",
        "summary": "2112693",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2112693"
      },
      {
        "category": "external",
        "summary": "2114878",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114878"
      },
      {
        "category": "external",
        "summary": "2115065",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115065"
      },
      {
        "category": "external",
        "summary": "2115278",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115278"
      },
      {
        "category": "external",
        "summary": "2120175",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2120175"
      },
      {
        "category": "external",
        "summary": "2123695",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123695"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7444.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
    "tracking": {
      "current_release_date": "2024-11-06T01:55:25+00:00",
      "generator": {
        "date": "2024-11-06T01:55:25+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.1.1"
        }
      },
      "id": "RHSA-2022:7444",
      "initial_release_date": "2022-11-08T09:25:15+00:00",
      "revision_history": [
        {
          "date": "2022-11-08T09:25:15+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-11-08T09:25:15+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-06T01:55:25+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
                  "product_id": "NFV-8.7.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Real Time (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux Real Time (v. 8)",
                  "product_id": "RT-8.7.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
                "product": {
                  "name": "kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
                  "product_id": "kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-425.3.1.rt7.213.el8?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                "product": {
                  "name": "kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                  "product_id": "kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-425.3.1.rt7.213.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                "product": {
                  "name": "kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                  "product_id": "kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-425.3.1.rt7.213.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                  "product_id": "kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-425.3.1.rt7.213.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                  "product_id": "kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-425.3.1.rt7.213.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-425.3.1.rt7.213.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                  "product_id": "kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-425.3.1.rt7.213.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                  "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-425.3.1.rt7.213.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                  "product_id": "kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-425.3.1.rt7.213.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                "product": {
                  "name": "kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                  "product_id": "kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-425.3.1.rt7.213.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                "product": {
                  "name": "kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                  "product_id": "kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-425.3.1.rt7.213.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-425.3.1.rt7.213.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-425.3.1.rt7.213.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-425.3.1.rt7.213.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                  "product_id": "kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-425.3.1.rt7.213.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                "product": {
                  "name": "kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                  "product_id": "kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-425.3.1.rt7.213.el8?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src"
        },
        "product_reference": "kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
        "relates_to_product_reference": "NFV-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        },
        "product_reference": "kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
        "relates_to_product_reference": "NFV-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        },
        "product_reference": "kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
        "relates_to_product_reference": "NFV-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
        "relates_to_product_reference": "NFV-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
        "relates_to_product_reference": "NFV-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
        "relates_to_product_reference": "NFV-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
        "relates_to_product_reference": "NFV-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
        "relates_to_product_reference": "NFV-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
        "relates_to_product_reference": "NFV-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
        "relates_to_product_reference": "NFV-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
        "relates_to_product_reference": "NFV-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
        "relates_to_product_reference": "NFV-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
        "relates_to_product_reference": "NFV-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
        "relates_to_product_reference": "NFV-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        },
        "product_reference": "kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
        "relates_to_product_reference": "NFV-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        },
        "product_reference": "kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
        "relates_to_product_reference": "NFV-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src"
        },
        "product_reference": "kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
        "relates_to_product_reference": "RT-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        },
        "product_reference": "kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
        "relates_to_product_reference": "RT-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        },
        "product_reference": "kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
        "relates_to_product_reference": "RT-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
        "relates_to_product_reference": "RT-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
        "relates_to_product_reference": "RT-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
        "relates_to_product_reference": "RT-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
        "relates_to_product_reference": "RT-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
        "relates_to_product_reference": "RT-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
        "relates_to_product_reference": "RT-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
        "relates_to_product_reference": "RT-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
        "relates_to_product_reference": "RT-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
        "relates_to_product_reference": "RT-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
        "relates_to_product_reference": "RT-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
        "relates_to_product_reference": "RT-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        },
        "product_reference": "kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
        "relates_to_product_reference": "RT-8.7.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        },
        "product_reference": "kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
        "relates_to_product_reference": "RT-8.7.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-36516",
      "cwe": {
        "id": "CWE-290",
        "name": "Authentication Bypass by Spoofing"
      },
      "discovery_date": "2022-03-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2059928"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A TCP/IP packet spoofing attack flaw was found in the Linux kernel\u2019s TCP/IP protocol, where a Man-in-the-Middle Attack (MITM) performs an IP fragmentation attack and an IPID collision. This flaw allows a remote user to pretend to be the sender of the TCP/IP packet for an existing TCP/IP session.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: off-path attacker may inject data or terminate victim\u0027s TCP session",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-36516"
        },
        {
          "category": "external",
          "summary": "RHBZ#2059928",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2059928"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36516",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-36516"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36516",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36516"
        },
        {
          "category": "external",
          "summary": "https://www.spinics.net/lists/netdev/msg795642.html",
          "url": "https://www.spinics.net/lists/netdev/msg795642.html"
        }
      ],
      "release_date": "2022-02-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: off-path attacker may inject data or terminate victim\u0027s TCP session"
    },
    {
      "cve": "CVE-2020-36558",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-07-31T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2112693"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s Virtual Terminal subsystem was found in how a user calls the VT_RESIZEX ioctl. This flaw allows a local user to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-36558"
        },
        {
          "category": "external",
          "summary": "RHBZ#2112693",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2112693"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36558",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-36558"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36558",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36558"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cd1ed50efd88261298577cd92a14f2768eddeeb",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cd1ed50efd88261298577cd92a14f2768eddeeb"
        }
      ],
      "release_date": "2020-02-10T10:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference"
    },
    {
      "cve": "CVE-2021-3640",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2021-07-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980646"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free vulnerability in function sco_sock_sendmsg()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having a Moderate impact because of the privileges (CAP_NET_ADMIN in initial namespace) required for exploiting the issue.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3640"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980646",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980646"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3640",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3640"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3640",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3640"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16\u0026id=99c23da0eed4fd20cae8243f2b51e10e66aa0951",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16\u0026id=99c23da0eed4fd20cae8243f2b51e10e66aa0951"
        },
        {
          "category": "external",
          "summary": "https://lkml.org/lkml/2021/8/28/238",
          "url": "https://lkml.org/lkml/2021/8/28/238"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/07/22/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/07/22/1"
        }
      ],
      "release_date": "2021-07-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free vulnerability in function sco_sock_sendmsg()"
    },
    {
      "cve": "CVE-2021-30002",
      "cwe": {
        "id": "CWE-772",
        "name": "Missing Release of Resource after Effective Lifetime"
      },
      "discovery_date": "2021-04-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1946279"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw memory leak in the Linux kernel webcam device functionality was found in the way user calls ioctl that triggers video_usercopy function. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory leak for large arguments in video_usercopy function in drivers/media/v4l2-core/v4l2-ioctl.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-30002"
        },
        {
          "category": "external",
          "summary": "RHBZ#1946279",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946279"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30002",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-30002"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30002",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30002"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb18802a338b36f675a388fc03d2aa504a0d0899",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb18802a338b36f675a388fc03d2aa504a0d0899"
        }
      ],
      "release_date": "2021-04-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent the module v4l2-common from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: memory leak for large arguments in video_usercopy function in drivers/media/v4l2-core/v4l2-ioctl.c"
    },
    {
      "cve": "CVE-2021-47099",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2024-03-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2267919"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nveth: ensure skb entering GRO are not cloned.\n\nAfter commit d3256efd8e8b (\"veth: allow enabling NAPI even without XDP\"),\nif GRO is enabled on a veth device and TSO is disabled on the peer\ndevice, TCP skbs will go through the NAPI callback. If there is no XDP\nprogram attached, the veth code does not perform any share check, and\nshared/cloned skbs could enter the GRO engine.\n\nIgnat reported a BUG triggered later-on due to the above condition:\n\n[   53.970529][    C1] kernel BUG at net/core/skbuff.c:3574!\n[   53.981755][    C1] invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI\n[   53.982634][    C1] CPU: 1 PID: 19 Comm: ksoftirqd/1 Not tainted 5.16.0-rc5+ #25\n[   53.982634][    C1] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015\n[   53.982634][    C1] RIP: 0010:skb_shift+0x13ef/0x23b0\n[   53.982634][    C1] Code: ea 03 0f b6 04 02 48 89 fa 83 e2 07 38 d0\n7f 08 84 c0 0f 85 41 0c 00 00 41 80 7f 02 00 4d 8d b5 d0 00 00 00 0f\n85 74 f5 ff ff \u003c0f\u003e 0b 4d 8d 77 20 be 04 00 00 00 4c 89 44 24 78 4c 89\nf7 4c 89 8c\n[   53.982634][    C1] RSP: 0018:ffff8881008f7008 EFLAGS: 00010246\n[   53.982634][    C1] RAX: 0000000000000000 RBX: ffff8881180b4c80 RCX: 0000000000000000\n[   53.982634][    C1] RDX: 0000000000000002 RSI: ffff8881180b4d3c RDI: ffff88810bc9cac2\n[   53.982634][    C1] RBP: ffff8881008f70b8 R08: ffff8881180b4cf4 R09: ffff8881180b4cf0\n[   53.982634][    C1] R10: ffffed1022999e5c R11: 0000000000000002 R12: 0000000000000590\n[   53.982634][    C1] R13: ffff88810f940c80 R14: ffff88810f940d50 R15: ffff88810bc9cac0\n[   53.982634][    C1] FS:  0000000000000000(0000) GS:ffff888235880000(0000) knlGS:0000000000000000\n[   53.982634][    C1] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[   53.982634][    C1] CR2: 00007ff5f9b86680 CR3: 0000000108ce8004 CR4: 0000000000170ee0\n[   53.982634][    C1] Call Trace:\n[   53.982634][    C1]  \u003cTASK\u003e\n[   53.982634][    C1]  tcp_sacktag_walk+0xaba/0x18e0\n[   53.982634][    C1]  tcp_sacktag_write_queue+0xe7b/0x3460\n[   53.982634][    C1]  tcp_ack+0x2666/0x54b0\n[   53.982634][    C1]  tcp_rcv_established+0x4d9/0x20f0\n[   53.982634][    C1]  tcp_v4_do_rcv+0x551/0x810\n[   53.982634][    C1]  tcp_v4_rcv+0x22ed/0x2ed0\n[   53.982634][    C1]  ip_protocol_deliver_rcu+0x96/0xaf0\n[   53.982634][    C1]  ip_local_deliver_finish+0x1e0/0x2f0\n[   53.982634][    C1]  ip_sublist_rcv_finish+0x211/0x440\n[   53.982634][    C1]  ip_list_rcv_finish.constprop.0+0x424/0x660\n[   53.982634][    C1]  ip_list_rcv+0x2c8/0x410\n[   53.982634][    C1]  __netif_receive_skb_list_core+0x65c/0x910\n[   53.982634][    C1]  netif_receive_skb_list_internal+0x5f9/0xcb0\n[   53.982634][    C1]  napi_complete_done+0x188/0x6e0\n[   53.982634][    C1]  gro_cell_poll+0x10c/0x1d0\n[   53.982634][    C1]  __napi_poll+0xa1/0x530\n[   53.982634][    C1]  net_rx_action+0x567/0x1270\n[   53.982634][    C1]  __do_softirq+0x28a/0x9ba\n[   53.982634][    C1]  run_ksoftirqd+0x32/0x60\n[   53.982634][    C1]  smpboot_thread_fn+0x559/0x8c0\n[   53.982634][    C1]  kthread+0x3b9/0x490\n[   53.982634][    C1]  ret_from_fork+0x22/0x30\n[   53.982634][    C1]  \u003c/TASK\u003e\n\nAddress the issue by skipping the GRO stage for shared or cloned skbs.\nTo reduce the chance of OoO, try to unclone the skbs before giving up.\n\nv1 -\u003e v2:\n - use avoid skb_copy and fallback to netif_receive_skb  - Eric",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: veth: ensure skb entering GRO are not cloned.",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-47099"
        },
        {
          "category": "external",
          "summary": "RHBZ#2267919",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267919"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-47099",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-47099"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47099",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47099"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2024030415-CVE-2021-47099-3127@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2024030415-CVE-2021-47099-3127@gregkh/T"
        }
      ],
      "release_date": "2024-03-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: veth: ensure skb entering GRO are not cloned."
    },
    {
      "cve": "CVE-2021-47580",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2024-06-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2293249"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_debug: Fix type in min_t to avoid stack OOB\n\nChange min_t() to use type \"u32\" instead of type \"int\" to avoid stack out\nof bounds. With min_t() type \"int\" the values get sign extended and the\nlarger value gets used causing stack out of bounds.\n\nBUG: KASAN: stack-out-of-bounds in memcpy include/linux/fortify-string.h:191 [inline]\nBUG: KASAN: stack-out-of-bounds in sg_copy_buffer+0x1de/0x240 lib/scatterlist.c:976\nRead of size 127 at addr ffff888072607128 by task syz-executor.7/18707\n\nCPU: 1 PID: 18707 Comm: syz-executor.7 Not tainted 5.15.0-syzk #1\nHardware name: Red Hat KVM, BIOS 1.13.0-2\nCall Trace:\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x89/0xb5 lib/dump_stack.c:106\n print_address_description.constprop.9+0x28/0x160 mm/kasan/report.c:256\n __kasan_report mm/kasan/report.c:442 [inline]\n kasan_report.cold.14+0x7d/0x117 mm/kasan/report.c:459\n check_region_inline mm/kasan/generic.c:183 [inline]\n kasan_check_range+0x1a3/0x210 mm/kasan/generic.c:189\n memcpy+0x23/0x60 mm/kasan/shadow.c:65\n memcpy include/linux/fortify-string.h:191 [inline]\n sg_copy_buffer+0x1de/0x240 lib/scatterlist.c:976\n sg_copy_from_buffer+0x33/0x40 lib/scatterlist.c:1000\n fill_from_dev_buffer.part.34+0x82/0x130 drivers/scsi/scsi_debug.c:1162\n fill_from_dev_buffer drivers/scsi/scsi_debug.c:1888 [inline]\n resp_readcap16+0x365/0x3b0 drivers/scsi/scsi_debug.c:1887\n schedule_resp+0x4d8/0x1a70 drivers/scsi/scsi_debug.c:5478\n scsi_debug_queuecommand+0x8c9/0x1ec0 drivers/scsi/scsi_debug.c:7533\n scsi_dispatch_cmd drivers/scsi/scsi_lib.c:1520 [inline]\n scsi_queue_rq+0x16b0/0x2d40 drivers/scsi/scsi_lib.c:1699\n blk_mq_dispatch_rq_list+0xb9b/0x2700 block/blk-mq.c:1639\n __blk_mq_sched_dispatch_requests+0x28f/0x590 block/blk-mq-sched.c:325\n blk_mq_sched_dispatch_requests+0x105/0x190 block/blk-mq-sched.c:358\n __blk_mq_run_hw_queue+0xe5/0x150 block/blk-mq.c:1761\n __blk_mq_delay_run_hw_queue+0x4f8/0x5c0 block/blk-mq.c:1838\n blk_mq_run_hw_queue+0x18d/0x350 block/blk-mq.c:1891\n blk_mq_sched_insert_request+0x3db/0x4e0 block/blk-mq-sched.c:474\n blk_execute_rq_nowait+0x16b/0x1c0 block/blk-exec.c:62\n sg_common_write.isra.18+0xeb3/0x2000 drivers/scsi/sg.c:836\n sg_new_write.isra.19+0x570/0x8c0 drivers/scsi/sg.c:774\n sg_ioctl_common+0x14d6/0x2710 drivers/scsi/sg.c:939\n sg_ioctl+0xa2/0x180 drivers/scsi/sg.c:1165\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:874 [inline]\n __se_sys_ioctl fs/ioctl.c:860 [inline]\n __x64_sys_ioctl+0x19d/0x220 fs/ioctl.c:860\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3a/0x80 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: scsi: scsi_debug: Fix type in min_t to avoid stack OOB",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-47580"
        },
        {
          "category": "external",
          "summary": "RHBZ#2293249",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293249"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-47580",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-47580"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47580",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47580"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2024061916-CVE-2021-47580-eac9@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2024061916-CVE-2021-47580-eac9@gregkh/T"
        }
      ],
      "release_date": "2024-06-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: scsi: scsi_debug: Fix type in min_t to avoid stack OOB"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Billy Jheng Bing Jhong"
          ],
          "organization": "STAR Labs"
        }
      ],
      "cve": "CVE-2022-0168",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-01-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2037386"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A denial of service (DOS) issue was found in the Linux kernel\u2019s smb2_ioctl_query_info function in the fs/cifs/smb2ops.c Common Internet File System (CIFS) due to an incorrect return from the memdup_user function. This flaw allows a local, privileged (CAP_SYS_ADMIN) attacker to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: smb2_ioctl_query_info NULL pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0168"
        },
        {
          "category": "external",
          "summary": "RHBZ#2037386",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037386"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0168",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0168"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0168",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0168"
        }
      ],
      "release_date": "2022-03-09T15:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: smb2_ioctl_query_info NULL pointer dereference"
    },
    {
      "cve": "CVE-2022-0617",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-02-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2053632"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference was found in the Linux kernel\u2019s UDF file system functionality in the way the user triggers the udf_file_write_iter function for a malicious UDF image. This flaw allows a local user to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0617"
        },
        {
          "category": "external",
          "summary": "RHBZ#2053632",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053632"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0617",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0617"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0617",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0617"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7fc3b7c2981bbd1047916ade327beccb90994eee",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7fc3b7c2981bbd1047916ade327beccb90994eee"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea8569194b43f0f01f0a84c689388542c7254a1f",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea8569194b43f0f01f0a84c689388542c7254a1f"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/lkml/20220114172329.ygzry5rlz64ua2nr@quack3.lan/T/",
          "url": "https://lore.kernel.org/lkml/20220114172329.ygzry5rlz64ua2nr@quack3.lan/T/"
        }
      ],
      "release_date": "2022-01-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        },
        {
          "category": "workaround",
          "details": "As the UDF module (udf.ho) will be auto-loaded when required, its use can be disabled  by preventing the module from loading with the following instructions:\n\n# echo \"install udf /bin/true\" \u003e\u003e /etc/modprobe.d/disable-udf.conf\n\nIf the system requires this module t\\work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see the KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Halil Pasic"
          ]
        }
      ],
      "cve": "CVE-2022-0854",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2022-02-24T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2058395"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak flaw was found in the Linux kernel\u2019s DMA subsystem, in the way a user calls DMA_FROM_DEVICE. This flaw allows a local user to read random memory from the kernel space.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: swiotlb information leak with DMA_FROM_DEVICE",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0854"
        },
        {
          "category": "external",
          "summary": "RHBZ#2058395",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2058395"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0854",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0854"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0854",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0854"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/dma/swiotlb.c?h=v5.17-rc8\u0026id=aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/dma/swiotlb.c?h=v5.17-rc8\u0026id=aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13"
        }
      ],
      "release_date": "2022-03-07T10:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: swiotlb information leak with DMA_FROM_DEVICE"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "David Bouman"
          ]
        }
      ],
      "cve": "CVE-2022-1016",
      "cwe": {
        "id": "CWE-909",
        "name": "Missing Initialization of Resource"
      },
      "discovery_date": "2022-03-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2066614"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle \u0027return\u0027 with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1016"
        },
        {
          "category": "external",
          "summary": "RHBZ#2066614",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066614"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1016",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1016"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1016",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1016"
        },
        {
          "category": "external",
          "summary": "http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/",
          "url": "http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/"
        },
        {
          "category": "external",
          "summary": "https://seclists.org/oss-sec/2022/q1/205",
          "url": "https://seclists.org/oss-sec/2022/q1/205"
        }
      ],
      "release_date": "2022-03-28T15:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        },
        {
          "category": "workaround",
          "details": "On non-containerized deployments of Red Hat Enterprise Linux, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Takashi Iwai"
          ]
        }
      ],
      "cve": "CVE-2022-1048",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-03-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2066706"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s sound subsystem in the way a user triggers concurrent calls of PCM hw_params. The hw_free ioctls or similar race condition happens inside ALSA PCM for other ioctls. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition in snd_pcm_hw_free leading to use-after-free",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Keeping the rating as Moderate, because this issue is hard to trigger and requires some permissions for accessing the sound card and only exists if a specific model of the sound card such as Intel 82801 or similar. The known reproducer works only for systems where the /dev/snd/pcmC0D1c device exists.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1048"
        },
        {
          "category": "external",
          "summary": "RHBZ#2066706",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066706"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1048",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1048"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1048",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1048"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/lkml/20220322170720.3529-5-tiwai@suse.de/T/#m1d3b791b815556012c6be92f1c4a7086b854f7f3",
          "url": "https://lore.kernel.org/lkml/20220322170720.3529-5-tiwai@suse.de/T/#m1d3b791b815556012c6be92f1c4a7086b854f7f3"
        }
      ],
      "release_date": "2022-03-23T10:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent the module snd-pcm from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: race condition in snd_pcm_hw_free leading to use-after-free"
    },
    {
      "cve": "CVE-2022-1055",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-03-29T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2070220"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the tc_new_tfilter function in net/sched/cls_api.c in the Linux kernel. The availability of local, unprivileged user namespaces allows privilege escalation.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in tc_new_tfilter() in net/sched/cls_api.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The vulnerability in the Linux kernel is shipped in Red Hat Enterprise Linux 8.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1055"
        },
        {
          "category": "external",
          "summary": "RHBZ#2070220",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2070220"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1055",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1055"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1055",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1055"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5"
        },
        {
          "category": "external",
          "summary": "https://syzkaller.appspot.com/bug?id=2212474c958978ab86525fe6832ac8102c309ffc",
          "url": "https://syzkaller.appspot.com/bug?id=2212474c958978ab86525fe6832ac8102c309ffc"
        }
      ],
      "release_date": "2022-01-31T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        },
        {
          "category": "workaround",
          "details": "On non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in tc_new_tfilter() in net/sched/cls_api.c"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Qiuhao Li"
          ],
          "organization": "Harbin Institute of Technology"
        },
        {
          "names": [
            "Gaoning Pan",
            "Yongkang Jia"
          ],
          "organization": "Zhejiang University"
        }
      ],
      "cve": "CVE-2022-1158",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-03-29T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2069793"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in KVM. When updating a guest\u0027s page table entry, vm_pgoff was improperly used as the offset to get the page\u0027s pfn. As vaddr and vm_pgoff are controllable by user-mode processes, this flaw allows unprivileged local users on the host to write outside the userspace region and potentially corrupt the kernel, resulting in a denial of service condition.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1158"
        },
        {
          "category": "external",
          "summary": "RHBZ#2069793",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069793"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1158",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1158"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1158",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1158"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2022/04/08/4",
          "url": "https://www.openwall.com/lists/oss-security/2022/04/08/4"
        }
      ],
      "release_date": "2022-04-07T15:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Wenqing Liu"
          ]
        }
      ],
      "cve": "CVE-2022-1184",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-01-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2070205"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel\u2019s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free and memory errors in ext4 when mounting and operating on a corrupted image",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1184"
        },
        {
          "category": "external",
          "summary": "RHBZ#2070205",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2070205"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1184",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1184"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1184",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1184"
        }
      ],
      "release_date": "2022-04-18T05:39:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free and memory errors in ext4 when mounting and operating on a corrupted image"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Yongkang Jia",
            "Gaoning Pan"
          ],
          "organization": "Zhejiang University"
        },
        {
          "names": [
            "Qiuhao Li"
          ],
          "organization": "Harbin Institute of Technology"
        }
      ],
      "cve": "CVE-2022-1263",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-04-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2072698"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: KVM: NULL pointer dereference in kvm_dirty_ring_push in virt/kvm/dirty_ring.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Enterprise Linux 6 and 7 did not provide support for KVM dirty ring and therefore are not affected by this issue.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1263"
        },
        {
          "category": "external",
          "summary": "RHBZ#2072698",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072698"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1263",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1263"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1263",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1263"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2022/04/07/1",
          "url": "https://www.openwall.com/lists/oss-security/2022/04/07/1"
        }
      ],
      "release_date": "2022-04-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: KVM: NULL pointer dereference in kvm_dirty_ring_push in virt/kvm/dirty_ring.c"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Qiuhao Li"
          ],
          "organization": "(Harbin Institute of Technology)"
        },
        {
          "names": [
            "Gaoning Pan",
            "Yongkang Jia"
          ],
          "organization": "(Zhejiang University)"
        }
      ],
      "cve": "CVE-2022-1852",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-05-24T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2089815"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: NULL pointer dereference in x86_emulate_insn may lead to DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1852"
        },
        {
          "category": "external",
          "summary": "RHBZ#2089815",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089815"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1852",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1852"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1852",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1852"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/fee060cd52d69c114b62d1a2948ea9648b5131f9",
          "url": "https://github.com/torvalds/linux/commit/fee060cd52d69c114b62d1a2948ea9648b5131f9"
        }
      ],
      "release_date": "2022-06-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        },
        {
          "category": "workaround",
          "details": "This flaw can be mitigated by preventing the affected KVM module from loading during the boot time, and ensuring the module is added to the blacklist file.\n~~~\nRefer:  \nHow do I blacklist a kernel module to prevent it from loading automatically? \nhttps://access.redhat.com/solutions/41278\n~~~",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: NULL pointer dereference in x86_emulate_insn may lead to DoS"
    },
    {
      "cve": "CVE-2022-2078",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "discovery_date": "2022-06-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2096178"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in the Linux kernel\u0027s nft_set_desc_concat_parse() function .This flaw allows an attacker to trigger a buffer overflow via nft_set_desc_concat_parse() , causing a denial of service and possibly to run code.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: buffer overflow in nft_set_desc_concat_parse()",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-2078"
        },
        {
          "category": "external",
          "summary": "RHBZ#2096178",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096178"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2078",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-2078"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2078",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2078"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/nf_tables_api.c?id=fecf31ee395b0295f2d7260aa29946b7605f7c85",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/nf_tables_api.c?id=fecf31ee395b0295f2d7260aa29946b7605f7c85"
        }
      ],
      "release_date": "2022-05-31T06:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: buffer overflow in nft_set_desc_concat_parse()"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Yongkang Jia",
            "Gaoning Pan"
          ],
          "organization": "Zhejiang University"
        }
      ],
      "cve": "CVE-2022-2153",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-03-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2069736"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM when attempting to set a SynIC IRQ. This issue makes it possible for a misbehaving VMM to write to SYNIC/STIMER MSRs, causing a NULL pointer dereference. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: KVM: NULL pointer dereference in kvm_irq_delivery_to_apic_fast()",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-2153"
        },
        {
          "category": "external",
          "summary": "RHBZ#2069736",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069736"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2153",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-2153"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2153",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2153"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2022/06/22/1",
          "url": "https://www.openwall.com/lists/oss-security/2022/06/22/1"
        }
      ],
      "release_date": "2022-03-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: KVM: NULL pointer dereference in kvm_irq_delivery_to_apic_fast()"
    },
    {
      "cve": "CVE-2022-2503",
      "cwe": {
        "id": "CWE-288",
        "name": "Authentication Bypass Using an Alternate Path or Channel"
      },
      "discovery_date": "2022-08-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2177862"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module and firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification until reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: LoadPin bypass via dm-verity table reload",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Starting from the Red Hat Enterprise Linux version 8.7 the bug already fixed (by previous ticket https://bugzilla.redhat.com/show_bug.cgi?id=2012340).\nSimilar for the Red Hat Enterprise Linux version 9.1 it is already fixed (by the ticket https://bugzilla.redhat.com/show_bug.cgi?id=2090507).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-2503"
        },
        {
          "category": "external",
          "summary": "RHBZ#2177862",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177862"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2503",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-2503"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2503",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2503"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-6vq3-w69p-w63m",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-6vq3-w69p-w63m"
        }
      ],
      "release_date": "2022-08-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: LoadPin bypass via dm-verity table reload"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Team Orca"
          ],
          "organization": "Sea Security"
        }
      ],
      "cve": "CVE-2022-2586",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-08-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2114878"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in nf_tables cross-table in the net/netfilter/nf_tables_api.c function in the Linux kernel. This flaw allows a local, privileged attacker to cause a use-after-free problem at the time of table deletion, possibly leading to local privilege escalation.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: nf_tables cross-table potential use-after-free may lead to local privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-2586"
        },
        {
          "category": "external",
          "summary": "RHBZ#2114878",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114878"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2586",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-2586"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2586",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2586"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/netfilter-devel/20220809170148.164591-1-cascardo@canonical.com/T/#t",
          "url": "https://lore.kernel.org/netfilter-devel/20220809170148.164591-1-cascardo@canonical.com/T/#t"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2022/08/09/5",
          "url": "https://www.openwall.com/lists/oss-security/2022/08/09/5"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-08-09T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2024-06-26T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: nf_tables cross-table potential use-after-free may lead to local privilege escalation"
    },
    {
      "cve": "CVE-2022-2639",
      "cwe": {
        "id": "CWE-681",
        "name": "Incorrect Conversion between Numeric Types"
      },
      "discovery_date": "2022-05-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2084479"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The `openvswitch` is not supported out of the Layered Products subscriptions (OCP, OSP, RHV). There are no Layered Products based on Red Hat Enterprise Linux 7 at the present time. Therefore, this CVE is not planned to be addressed on Red Hat Enterprise Linux 7.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-2639"
        },
        {
          "category": "external",
          "summary": "RHBZ#2084479",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084479"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2639",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-2639"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2639",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2639"
        }
      ],
      "release_date": "2022-04-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, it is possible to prevent the affected code from being loaded by blocklisting the openvswitch kernel module. For instructions relating to blocklisting a kernel module, please see https://access.redhat.com/solutions/41278.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()"
    },
    {
      "cve": "CVE-2022-2938",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-03-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2120175"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s implementation of Pressure Stall Information. While the feature is disabled by default, it could allow an attacker to crash the system or have other memory-corruption side effects.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free when psi trigger is destroyed while being polled",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Pressure Stall Subsystem (PSI) is disabled by default on Red Hat kernels, if the feature has not been explicitly enabled using a kernel boot time parameter of \u0027psi=1\u0027, the system is not affected.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-2938"
        },
        {
          "category": "external",
          "summary": "RHBZ#2120175",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2120175"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2938",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-2938"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2938",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2938"
        }
      ],
      "release_date": "2022-01-10T14:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free when psi trigger is destroyed while being polled"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Jiasheng Jiang"
          ]
        }
      ],
      "cve": "CVE-2022-3107",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-12-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2153060"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in the Linux kernel through 5.16-rc6. netvsc_get_ethtool_stats in drivers/net/hyperv/netvsc_drv.c lacks check of the return value of kvmalloc_array() and will cause the null pointer dereference.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: hv_netvsc: NULL pointer dereference in netvsc_get_ethtool_stats()",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3107"
        },
        {
          "category": "external",
          "summary": "RHBZ#2153060",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153060"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3107",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3107"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3107",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3107"
        }
      ],
      "release_date": "2022-12-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: hv_netvsc: NULL pointer dereference in netvsc_get_ethtool_stats()"
    },
    {
      "cve": "CVE-2022-20368",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2022-08-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2123695"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds access issue was found in the Linux kernel networking subsystem in the way raw packet sockets (AF_PACKET) used PACKET_COPY_THRESH and mmap operations. A local attacker with CAP_NET_RAW capability could use this flaw to trigger a buffer overflow resulting in a system crash or privilege escalation.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: net/packet: slab-out-of-bounds access in packet_recvmsg()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Only local users with `CAP_NET_RAW` capability enabled can trigger this issue. On Red Hat Enterprise Linux 8 `CAP_NET_RAW` capability can be gained by exploiting unprivileged user namespaces.\n\nIn a default or common use of Red Hat Enterprise Linux 7 unprivileged user namespaces are disabled by default, so local unprivileged users cannot abuse namespaces to grant themselves the `CAP_NET_RAW` capability and potentially elevate their privileges on the system.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-20368"
        },
        {
          "category": "external",
          "summary": "RHBZ#2123695",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123695"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-20368",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-20368"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-20368",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20368"
        }
      ],
      "release_date": "2022-03-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        },
        {
          "category": "workaround",
          "details": "The mitigation is to disable CAP_NET_RAW capability for regular users and executables to prevent access to raw packet sockets (AF_PACKET). On Red Hat Enterprise Linux 8, the mitigation is to either disable unprivileged user namespaces with `sysctl -w user.max_user_namespaces=0` or network namespaces with `sysctl -w user.max_net_namespaces=0`. For more information on how to set sysctl variables on Red Hat Enterprise Linux, please refer to https://access.redhat.com/solutions/2587.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: net/packet: slab-out-of-bounds access in packet_recvmsg()"
    },
    {
      "cve": "CVE-2022-20572",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2022-12-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2186545"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel, where it is possible to modify read-only files due to a missing permission check. This flaw can lead to local privilege escalation.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: missing DM_TARGET_IMMUTABLE feature flag in verity_target in drivers/md/dm-verity-target.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-20572"
        },
        {
          "category": "external",
          "summary": "RHBZ#2186545",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186545"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-20572",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-20572"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-20572",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20572"
        }
      ],
      "release_date": "2022-12-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: missing DM_TARGET_IMMUTABLE feature flag in verity_target in drivers/md/dm-verity-target.c"
    },
    {
      "cve": "CVE-2022-21499",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2022-05-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2084183"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the kernel/debug/debug_core.c in the Linux kernel in lockdown mode. This flaw allows an attacker with local access to trigger the debugger, bypass lockdown and write anonymously.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: possible to use the debugger to write zero into a location of choice",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-21499"
        },
        {
          "category": "external",
          "summary": "RHBZ#2084183",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084183"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21499",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-21499"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21499",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21499"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=eadb2f47a3ced5c64b23b90fd2a3463f63726066",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=eadb2f47a3ced5c64b23b90fd2a3463f63726066"
        }
      ],
      "release_date": "2022-05-24T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: possible to use the debugger to write zero into a location of choice"
    },
    {
      "cve": "CVE-2022-24448",
      "cwe": {
        "id": "CWE-908",
        "name": "Use of Uninitialized Resource"
      },
      "discovery_date": "2022-02-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2051444"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. When an application tries to open a directory (using the O_DIRECTORY flag) in a mounted NFS filesystem, a lookup operation is performed. If the NFS server returns a file as a result of the lookup, the NFS filesystem returns an uninitialized file descriptor instead of the expected ENOTDIR value. This flaw leads to the kernel\u0027s data leak into the userspace.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: nfs_atomic_open() returns uninitialized data instead of ENOTDIR",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-24448"
        },
        {
          "category": "external",
          "summary": "RHBZ#2051444",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051444"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24448",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-24448"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24448",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24448"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac795161c93699d600db16c1a8cc23a65a1eceaf",
          "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac795161c93699d600db16c1a8cc23a65a1eceaf"
        }
      ],
      "release_date": "2022-02-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: nfs_atomic_open() returns uninitialized data instead of ENOTDIR"
    },
    {
      "cve": "CVE-2022-26373",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2022-07-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2115065"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in hw. In certain processors with Intel\u0027s Enhanced Indirect Branch Restricted Speculation (eIBRS) capabilities, soon after VM exit or IBPB command event, the linear address following the most recent near CALL instruction prior to a VM exit may be used as the Return Stack Buffer (RSB) prediction.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-26373"
        },
        {
          "category": "external",
          "summary": "RHBZ#2115065",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115065"
        },
        {
          "category": "external",
          "summary": "RHSB-6971358",
          "url": "https://access.redhat.com/solutions/6971358"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26373",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26373",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26373"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/post-barrier-return-stack-buffer-predictions.html",
          "url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/post-barrier-return-stack-buffer-predictions.html"
        }
      ],
      "release_date": "2022-08-09T06:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions"
    },
    {
      "cve": "CVE-2022-27950",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2022-03-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2069408"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak flaw was found in elo_probe in drivers/hid/hid-elo.c in the Human Interface Devices (HID) in the Linux kernel. This issue allows an attacker to cause a denial of service when hid_parse() in elo_probe() fails.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory leak in drivers/hid/hid-elo.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-27950"
        },
        {
          "category": "external",
          "summary": "RHBZ#2069408",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069408"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-27950",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-27950"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27950",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27950"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=817b8b9c5396d2b2d92311b46719aad5d3339dbe",
          "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=817b8b9c5396d2b2d92311b46719aad5d3339dbe"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fbf42729d0e91332e8ce75a1ecce08b8a2dab9c1",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fbf42729d0e91332e8ce75a1ecce08b8a2dab9c1"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2022/03/13/1",
          "url": "https://www.openwall.com/lists/oss-security/2022/03/13/1"
        }
      ],
      "release_date": "2022-03-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: memory leak in drivers/hid/hid-elo.c"
    },
    {
      "cve": "CVE-2022-28390",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "discovery_date": "2022-04-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2073064"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A double-free flaw was found in the Linux kernel in the ems_usb_start_xmit function. This flaw allows an attacker to create a memory leak and corrupt the underlying data structure by calling free more than once.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-28390"
        },
        {
          "category": "external",
          "summary": "RHBZ#2073064",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073064"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28390",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-28390"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28390",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28390"
        }
      ],
      "release_date": "2022-04-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c"
    },
    {
      "cve": "CVE-2022-28893",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-04-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2074208"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s net/sunrpc/xprt.c function in the Remote Procedure Call (SunRPC) protocol. This flaw allows a local attacker to crash the system, leading to a kernel information leak issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use after free in SUNRPC subsystem",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-28893"
        },
        {
          "category": "external",
          "summary": "RHBZ#2074208",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074208"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28893",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-28893"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28893",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28893"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2022/04/11/3",
          "url": "http://www.openwall.com/lists/oss-security/2022/04/11/3"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2022/04/11/4",
          "url": "http://www.openwall.com/lists/oss-security/2022/04/11/4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1a3b1bba7c7a5eb8a11513cf88427cb9d77bc60a",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1a3b1bba7c7a5eb8a11513cf88427cb9d77bc60a"
        }
      ],
      "release_date": "2022-04-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        },
        {
          "category": "workaround",
          "details": "This flaw can be mitigated by preventing the affected SUNRPC  driver (sunrpc) kernel module from loading during the boot time, ensuring the module is added to the blacklist file.\n~~~\nRefer:  \nHow do I blacklist a kernel module to prevent it from loading automatically? \nhttps://access.redhat.com/solutions/41278\n~~~",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use after free in SUNRPC subsystem"
    },
    {
      "cve": "CVE-2022-29581",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-05-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2088021"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in u32_change in net/sched/cls_u32.c in the network subcomponent of the Linux kernel. This flaw allows a local attacker to crash the system, cause a privilege escalation, and leak kernel information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free due to improper update of reference count in net/sched/cls_u32.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Keeping the impact Moderate, because only memory leak can happen by default, and both hard to reproduce (at least reproducer not exists yet).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-29581"
        },
        {
          "category": "external",
          "summary": "RHBZ#2088021",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088021"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-29581",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-29581"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29581",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29581"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3db09e762dc79584a69c10d74a6b98f89a9979f8",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3db09e762dc79584a69c10d74a6b98f89a9979f8"
        },
        {
          "category": "external",
          "summary": "https://kernel.dance/#3db09e762dc79584a69c10d74a6b98f89a9979f8",
          "url": "https://kernel.dance/#3db09e762dc79584a69c10d74a6b98f89a9979f8"
        }
      ],
      "release_date": "2022-04-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent the module cls_u32 from being loaded by blacklisting the module to prevent it from loading automatically. \n~~~\nhttps://access.redhat.com/solutions/41278 \n~~~",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free due to improper update of reference count in net/sched/cls_u32.c"
    },
    {
      "cve": "CVE-2022-36946",
      "discovery_date": "2022-08-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2115278"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory corruption flaw was found in the Linux kernel\u2019s Netfilter subsystem in the way a local user uses the libnetfilter_queue when analyzing a corrupted network packet. This flaw allows a local user to crash the system or a remote user to crash the system when the libnetfilter_queue is used by a local user.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-36946"
        },
        {
          "category": "external",
          "summary": "RHBZ#2115278",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115278"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-36946",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-36946"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-36946",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36946"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/all/20220726104206.2036-1-fw@strlen.de/t/",
          "url": "https://lore.kernel.org/all/20220726104206.2036-1-fw@strlen.de/t/"
        }
      ],
      "release_date": "2022-07-26T09:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent the module nfnetlink_queue from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blocklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c"
    },
    {
      "cve": "CVE-2022-48918",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2024-08-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2307171"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A denial of service vulnerability was found in the Linux kernel. When debugfs is set as off in the kernel command line, iwiwifi\u0027s mvm module uses an invalid/unchecked debugfs_dir pointer, resulting in disruption to availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: iwlwifi: mvm: check debugfs_dir ptr before use",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
          "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
          "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-48918"
        },
        {
          "category": "external",
          "summary": "RHBZ#2307171",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2307171"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-48918",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-48918"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48918",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48918"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2024082217-CVE-2022-48918-9b85@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2024082217-CVE-2022-48918-9b85@gregkh/T"
        }
      ],
      "release_date": "2024-08-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-08T09:25:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7444"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "NFV-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "NFV-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.src",
            "RT-8.7.0.GA:kernel-rt-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-core-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-devel-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-kvm-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-0:4.18.0-425.3.1.rt7.213.el8.x86_64",
            "RT-8.7.0.GA:kernel-rt-modules-extra-0:4.18.0-425.3.1.rt7.213.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: iwlwifi: mvm: check debugfs_dir ptr before use"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.