rhsa-2023_2148
Vulnerability from csaf_redhat
Published
2023-05-09 10:01
Modified
2024-11-21 19:42
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896)
* net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)
* hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch (CVE-2021-26341)
* malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory (CVE-2021-33655)
* possible race condition in drivers/tty/tty_buffers.c (CVE-2022-1462)
* KVM: NULL pointer dereference in kvm_mmu_invpcid_gva (CVE-2022-1789)
* use-after-free in free_pipe_info() could lead to privilege escalation (CVE-2022-1882)
* KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks (CVE-2022-2196)
* netfilter: nf_conntrack_irc message handling issue (CVE-2022-2663)
* race condition in xfrm_probe_algs can lead to OOB read/write (CVE-2022-3028)
* out-of-bounds read in fib_nh_match of the file net/ipv4/fib_semantics.c (CVE-2022-3435)
* race condition in hugetlb_no_page() in mm/hugetlb.c (CVE-2022-3522)
* memory leak in ipv6_renew_options() (CVE-2022-3524)
* data races around icsk->icsk_af_ops in do_ipv6_setsockopt (CVE-2022-3566)
* data races around sk->sk_prot (CVE-2022-3567)
* memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c (CVE-2022-3619)
* denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry (CVE-2022-3623)
* use-after-free after failed devlink reload in devlink_param_get (CVE-2022-3625)
* USB-accessible buffer overflow in brcmfmac (CVE-2022-3628)
* use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c (CVE-2022-3640)
* Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed (CVE-2022-3707)
* mptcp: NULL pointer dereference in subflow traversal at disconnect time (CVE-2022-4128)
* l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference (CVE-2022-4129)
* igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets (CVE-2022-20141)
* lockdown bypass using IMA (CVE-2022-21505)
* double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c (CVE-2022-28388)
* network backend may cause Linux netfront to use freed SKBs (XSA-405) (CVE-2022-33743)
* unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry (CVE-2022-39188)
* TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning (CVE-2022-39189)
* u8 overflow problem in cfg80211_update_notlisted_nontrans() (CVE-2022-41674)
* use-after-free related to leaf anon_vma double reuse (CVE-2022-42703)
* use-after-free in bss_ref_get in net/wireless/scan.c (CVE-2022-42720)
* BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c (CVE-2022-42721)
* Denial of service in beacon protection for P2P-device (CVE-2022-42722)
* memory corruption in usbmon driver (CVE-2022-43750)
* NULL pointer dereference in traffic control subsystem (CVE-2022-47929)
* NULL pointer dereference in rawv6_push_pending_frames (CVE-2023-0394)
* use-after-free due to race condition in qdisc_graft() (CVE-2023-0590)
* use-after-free caused by invalid pointer hostname in fs/cifs/connect.c (CVE-2023-1195)
* denial of service in tipc_conn_close (CVE-2023-1382)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.2 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896)\n\n* net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)\n\n* hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch (CVE-2021-26341)\n\n* malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory (CVE-2021-33655)\n\n* possible race condition in drivers/tty/tty_buffers.c (CVE-2022-1462)\n\n* KVM: NULL pointer dereference in kvm_mmu_invpcid_gva (CVE-2022-1789)\n\n* use-after-free in free_pipe_info() could lead to privilege escalation (CVE-2022-1882)\n\n* KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks (CVE-2022-2196)\n\n* netfilter: nf_conntrack_irc message handling issue (CVE-2022-2663)\n\n* race condition in xfrm_probe_algs can lead to OOB read/write (CVE-2022-3028)\n\n* out-of-bounds read in fib_nh_match of the file net/ipv4/fib_semantics.c (CVE-2022-3435)\n\n* race condition in hugetlb_no_page() in mm/hugetlb.c (CVE-2022-3522)\n\n* memory leak in ipv6_renew_options() (CVE-2022-3524)\n\n* data races around icsk-\u003eicsk_af_ops in do_ipv6_setsockopt (CVE-2022-3566)\n\n* data races around sk-\u003esk_prot (CVE-2022-3567)\n\n* memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c (CVE-2022-3619)\n\n* denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry (CVE-2022-3623)\n\n* use-after-free after failed devlink reload in devlink_param_get (CVE-2022-3625)\n\n* USB-accessible buffer overflow in brcmfmac (CVE-2022-3628)\n\n* use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c (CVE-2022-3640)\n\n* Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed (CVE-2022-3707)\n\n* mptcp: NULL pointer dereference in subflow traversal at disconnect time (CVE-2022-4128)\n\n* l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference (CVE-2022-4129)\n\n* igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets (CVE-2022-20141)\n\n* lockdown bypass using IMA (CVE-2022-21505)\n\n* double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c (CVE-2022-28388)\n\n* network backend may cause Linux netfront to use freed SKBs (XSA-405) (CVE-2022-33743)\n\n* unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry (CVE-2022-39188)\n\n* TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning (CVE-2022-39189)\n\n* u8 overflow problem in cfg80211_update_notlisted_nontrans() (CVE-2022-41674)\n\n* use-after-free related to leaf anon_vma double reuse (CVE-2022-42703)\n\n* use-after-free in bss_ref_get in net/wireless/scan.c (CVE-2022-42720)\n\n* BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c (CVE-2022-42721)\n\n* Denial of service in beacon protection for P2P-device (CVE-2022-42722)\n\n* memory corruption in usbmon driver (CVE-2022-43750)\n\n* NULL pointer dereference in traffic control subsystem (CVE-2022-47929)\n\n* NULL pointer dereference in rawv6_push_pending_frames (CVE-2023-0394)\n\n* use-after-free due to race condition in qdisc_graft() (CVE-2023-0590)\n\n* use-after-free caused by invalid pointer hostname in fs/cifs/connect.c (CVE-2023-1195)\n\n* denial of service in tipc_conn_close (CVE-2023-1382)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.2 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:2148", "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index" }, { "category": "external", "summary": "2061703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061703" }, { "category": "external", "summary": "2073091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073091" }, { "category": "external", "summary": "2078466", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078466" }, { "category": "external", "summary": "2089701", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089701" }, { "category": "external", "summary": "2090723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090723" }, { "category": "external", "summary": "2106830", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106830" }, { "category": "external", "summary": "2107924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107924" }, { "category": "external", "summary": "2108691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108691" }, { "category": "external", "summary": "2114937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114937" }, { "category": "external", "summary": "2122228", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122228" }, { "category": "external", "summary": "2123056", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123056" }, { "category": "external", "summary": "2124788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124788" }, { "category": "external", "summary": "2130141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130141" }, { "category": "external", "summary": "2133483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133483" }, { "category": "external", "summary": "2133490", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133490" }, { "category": "external", "summary": "2134377", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134377" }, { "category": "external", "summary": "2134380", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134380" }, { "category": "external", "summary": "2134451", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134451" }, { "category": "external", "summary": "2134506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134506" }, { "category": "external", "summary": "2134517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134517" }, { "category": "external", "summary": "2134528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134528" }, { "category": "external", "summary": "2137979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137979" }, { "category": "external", "summary": "2139610", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139610" }, { "category": "external", "summary": "2143893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143893" }, { "category": "external", "summary": "2143943", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143943" }, { "category": "external", "summary": "2144720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2144720" }, { "category": "external", "summary": "2147364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147364" }, { "category": "external", "summary": "2150947", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150947" }, { "category": "external", "summary": "2150960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150960" }, { "category": "external", "summary": "2150979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150979" }, { "category": "external", "summary": "2151270", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151270" }, { "category": "external", "summary": "2154171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154171" }, { "category": "external", "summary": "2154235", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154235" }, { "category": "external", "summary": "2160023", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160023" }, { "category": "external", "summary": "2162120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162120" }, { "category": "external", "summary": "2165721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165721" }, { "category": "external", "summary": "2165741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165741" }, { "category": "external", "summary": "2168246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168246" }, { "category": "external", "summary": "2176192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176192" }, { "category": "external", "summary": "2177371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177371" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2148.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2024-11-21T19:42:28+00:00", "generator": { "date": "2024-11-21T19:42:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2023:2148", "initial_release_date": "2023-05-09T10:01:50+00:00", "revision_history": [ { "date": "2023-05-09T10:01:50+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-05-09T10:01:50+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T19:42:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux NFV (v. 9)", "product": { "name": "Red Hat Enterprise Linux NFV (v. 9)", "product_id": "NFV-9.2.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::nfv" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux RT (v. 9)", "product": { "name": "Red Hat Enterprise Linux RT (v. 9)", "product_id": "RT-9.2.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::realtime" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "product": { "name": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "product_id": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@5.14.0-284.11.1.rt14.296.el9_2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product": { "name": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_id": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product": { "name": "kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_id": "kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-core@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product": { "name": "kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_id": "kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product": { "name": "kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_id": "kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-core@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product": { "name": "kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_id": "kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_id": "kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product": { "name": "kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_id": "kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product": { "name": "kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_id": "kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-core@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product": { "name": "kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_id": "kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product": { "name": "kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_id": "kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product": { "name": "kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_id": "kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product": { "name": "kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_id": "kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product": { "name": "kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_id": "kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-core@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product": { "name": "kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_id": "kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product": { "name": "kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_id": "kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src as a component of Red Hat Enterprise Linux NFV (v. 9)", "product_id": "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src" }, "product_reference": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "relates_to_product_reference": "NFV-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)", "product_id": "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "NFV-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)", "product_id": "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "NFV-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)", "product_id": "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "NFV-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)", "product_id": "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "NFV-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)", "product_id": "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "NFV-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)", "product_id": "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "NFV-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)", "product_id": "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "NFV-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)", "product_id": "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "NFV-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)", "product_id": "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "NFV-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)", "product_id": "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "NFV-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)", "product_id": "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "NFV-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)", "product_id": "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "NFV-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)", "product_id": "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "NFV-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)", "product_id": "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "NFV-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)", "product_id": "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "NFV-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)", "product_id": "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "NFV-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)", "product_id": "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "NFV-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src as a component of Red Hat Enterprise Linux RT (v. 9)", "product_id": "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src" }, "product_reference": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "relates_to_product_reference": "RT-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)", "product_id": "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "RT-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)", "product_id": "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "RT-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)", "product_id": "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "RT-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)", "product_id": "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "RT-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)", "product_id": "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "RT-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)", "product_id": "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "RT-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)", "product_id": "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "RT-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)", "product_id": "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "RT-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)", "product_id": "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "RT-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)", "product_id": "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "RT-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)", "product_id": "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "RT-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)", "product_id": "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "RT-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)", "product_id": "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "RT-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)", "product_id": "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "RT-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)", "product_id": "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "RT-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)", "product_id": "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "RT-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)", "product_id": "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "relates_to_product_reference": "RT-9.2.0.GA" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "AMD" ] } ], "cve": "CVE-2021-26341", "cwe": { "id": "CWE-552", "name": "Files or Directories Accessible to External Parties" }, "discovery_date": "2022-03-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2061703" } ], "notes": [ { "category": "description", "text": "A flaw was found in hw. This issue can cause AMD CPUs to transiently execute beyond unconditional direct branches.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-26341" }, { "category": "external", "summary": "RHBZ#2061703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061703" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-26341", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26341" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26341", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26341" }, { "category": "external", "summary": "https://grsecurity.net/amd_branch_mispredictor_part_2_where_no_cpu_has_gone_before", "url": "https://grsecurity.net/amd_branch_mispredictor_part_2_where_no_cpu_has_gone_before" }, { "category": "external", "summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1026", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1026" }, { "category": "external", "summary": "https://www.amd.com/system/files/documents/software-techniques-for-managing-speculation.pdf", "url": "https://www.amd.com/system/files/documents/software-techniques-for-managing-speculation.pdf" } ], "release_date": "2022-03-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch" }, { "cve": "CVE-2021-33631", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2024-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2261976" } ], "notes": [ { "category": "description", "text": "A flaw was found in the openEuler kernel in Linux filesystem modules that allows an integer overflow via mounting a corrupted filesystem. This issue affects the openEuler kernel in versions from 4.19.90 through 4.19.90-2401.3 and 5.10.0-60.18.0 through 5.10.0-183.0.0.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ext4: kernel bug in ext4_write_inline_data_end()", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat has protection mechanisms in place against buffer overflows, such as FORTIFY_SOURCE, Position Independent Executables or Stack Smashing Protection.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33631" }, { "category": "external", "summary": "RHBZ#2261976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2261976" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33631", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33631" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33631", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33631" }, { "category": "external", "summary": "https://seclists.org/oss-sec/2024/q1/65", "url": "https://seclists.org/oss-sec/2024/q1/65" } ], "release_date": "2024-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: ext4: kernel bug in ext4_write_inline_data_end()" }, { "cve": "CVE-2021-33655", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-07-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108691" } ], "notes": [ { "category": "description", "text": "An out-of-bounds write flaw was found in the Linux kernel\u2019s framebuffer-based console driver functionality in the way a user triggers ioctl FBIOPUT_VSCREENINFO with malicious data. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33655" }, { "category": "external", "summary": "RHBZ#2108691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33655", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33655" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33655", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33655" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4" } ], "release_date": "2022-07-08T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory" }, { "cve": "CVE-2021-47560", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-05-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2283389" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Linux kernel\u0027s mlxsw spectrum driver, where processing port up/down events leads to a NULL pointer dereference. This issue occurs when the driver fails to handle events for the CPU port, which exists but lacks a corresponding network device, resulting in system crashes.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mlxsw: spectrum: Protect driver from buggy firmware", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-47560" }, { "category": "external", "summary": "RHBZ#2283389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283389" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-47560", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47560" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47560", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47560" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024052451-CVE-2021-47560-4a52@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024052451-CVE-2021-47560-4a52@gregkh/T" } ], "release_date": "2024-05-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: mlxsw: spectrum: Protect driver from buggy firmware" }, { "cve": "CVE-2021-47592", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-06-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2293235" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: stmmac: fix tc flower deletion for VLAN priority Rx steering\n\nTo replicate the issue:-\n\n1) Add 1 flower filter for VLAN Priority based frame steering:-\n$ IFDEVNAME=eth0\n$ tc qdisc add dev $IFDEVNAME ingress\n$ tc qdisc add dev $IFDEVNAME root mqprio num_tc 8 \\\n map 0 1 2 3 4 5 6 7 0 0 0 0 0 0 0 0 \\\n queues 1@0 1@1 1@2 1@3 1@4 1@5 1@6 1@7 hw 0\n$ tc filter add dev $IFDEVNAME parent ffff: protocol 802.1Q \\\n flower vlan_prio 0 hw_tc 0\n\n2) Get the \u0027pref\u0027 id\n$ tc filter show dev $IFDEVNAME ingress\n\n3) Delete a specific tc flower record (say pref 49151)\n$ tc filter del dev $IFDEVNAME parent ffff: pref 49151\n\nFrom dmesg, we will observe kernel NULL pointer ooops\n\n[ 197.170464] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[ 197.171367] #PF: supervisor read access in kernel mode\n[ 197.171367] #PF: error_code(0x0000) - not-present page\n[ 197.171367] PGD 0 P4D 0\n[ 197.171367] Oops: 0000 [#1] PREEMPT SMP NOPTI\n\n\u003csnip\u003e\n\n[ 197.171367] RIP: 0010:tc_setup_cls+0x20b/0x4a0 [stmmac]\n\n\u003csnip\u003e\n\n[ 197.171367] Call Trace:\n[ 197.171367] \u003cTASK\u003e\n[ 197.171367] ? __stmmac_disable_all_queues+0xa8/0xe0 [stmmac]\n[ 197.171367] stmmac_setup_tc_block_cb+0x70/0x110 [stmmac]\n[ 197.171367] tc_setup_cb_destroy+0xb3/0x180\n[ 197.171367] fl_hw_destroy_filter+0x94/0xc0 [cls_flower]\n\nThe above issue is due to previous incorrect implementation of\ntc_del_vlan_flow(), shown below, that uses flow_cls_offload_flow_rule()\nto get struct flow_rule *rule which is no longer valid for tc filter\ndelete operation.\n\n struct flow_rule *rule = flow_cls_offload_flow_rule(cls);\n struct flow_dissector *dissector = rule-\u003ematch.dissector;\n\nSo, to ensure tc_del_vlan_flow() deletes the right VLAN cls record for\nearlier configured RX queue (configured by hw_tc) in tc_add_vlan_flow(),\nthis patch introduces stmmac_rfs_entry as driver-side flow_cls_offload\nrecord for \u0027RX frame steering\u0027 tc flower, currently used for VLAN\npriority. The implementation has taken consideration for future extension\nto include other type RX frame steering such as EtherType based.\n\nv2:\n - Clean up overly extensive backtrace and rewrite git message to better\n explain the kernel NULL pointer issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: stmmac: fix tc flower deletion for VLAN priority Rx steering", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-47592" }, { "category": "external", "summary": "RHBZ#2293235", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293235" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-47592", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47592" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47592", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47592" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47592-7ca6@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47592-7ca6@gregkh/T" } ], "release_date": "2024-06-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: net: stmmac: fix tc flower deletion for VLAN priority Rx steering" }, { "cve": "CVE-2022-1462", "cwe": { "id": "CWE-366", "name": "Race Condition within a Thread" }, "discovery_date": "2022-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2078466" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in the Linux kernel\u2019s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possible race condition in drivers/tty/tty_buffers.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1462" }, { "category": "external", "summary": "RHBZ#2078466", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078466" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1462", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1462" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1462", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1462" }, { "category": "external", "summary": "https://seclists.org/oss-sec/2022/q2/155", "url": "https://seclists.org/oss-sec/2022/q2/155" } ], "release_date": "2022-05-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: possible race condition in drivers/tty/tty_buffers.c" }, { "acknowledgments": [ { "names": [ "Qiuhao Li" ], "organization": "Harbin Institute of Technology" }, { "names": [ "Yongkang Jia", "Gaoning Pan" ], "organization": "Zhejiang University" } ], "cve": "CVE-2022-1789", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2022-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2090723" } ], "notes": [ { "category": "description", "text": "A flaw was found in KVM. With shadow paging enabled if INVPCID is executed with CR0.PG=0, the invlpg callback is not set, and the result is a NULL pointer dereference. This flaw allows a guest user to cause a kernel oops condition on the host, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6 and 7 did not provide support for INVPCID in shadow paging mode and therefore are not affected by this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1789" }, { "category": "external", "summary": "RHBZ#2090723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090723" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1789", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1789" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1789", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1789" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-v8pq-23qj-q7x7", "url": "https://github.com/advisories/GHSA-v8pq-23qj-q7x7" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2022/05/25/2", "url": "https://www.openwall.com/lists/oss-security/2022/05/25/2" } ], "release_date": "2022-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva" }, { "acknowledgments": [ { "names": [ "elijahbai" ] } ], "cve": "CVE-2022-1882", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-05-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2089701" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in free_pipe_info() could lead to privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1882" }, { "category": "external", "summary": "RHBZ#2089701", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089701" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1882", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1882" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1882", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1882" }, { "category": "external", "summary": "https://git.kernel.org/linus/353f7988dd8413c4", "url": "https://git.kernel.org/linus/353f7988dd8413c4" } ], "release_date": "2022-05-07T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in free_pipe_info() could lead to privilege escalation" }, { "cve": "CVE-2022-2196", "cwe": { "id": "CWE-1188", "name": "Initialization of a Resource with an Insecure Default" }, "discovery_date": "2023-01-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2160023" } ], "notes": [ { "category": "description", "text": "A flaw was found in the KVM\u0027s Intel nested virtualization feature (nVMX). Since L1 and L2 shared branch prediction modes (guest-user and guest-kernel), KVM did not protect indirect branches in L1 from steering by a malicious agent in L2. This could allow a malicious nested guest to carry out Spectre v2 attacks against L1 due to a missing IBPB at VM-exit time.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat currently provides the nested virtualization feature as a Technology Preview. Nested virtualization is therefore unsupported for production use. For more information please refer to https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2196" }, { "category": "external", "summary": "RHBZ#2160023", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2196", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2196" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2196", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2196" } ], "release_date": "2022-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_intel\n# modprobe kvm_intel nested=0\n```", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks" }, { "cve": "CVE-2022-2663", "cwe": { "id": "CWE-923", "name": "Improper Restriction of Communication Channel to Intended Endpoints" }, "discovery_date": "2022-08-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2123056" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and it incorrectly matches on the message. An attacker could exploit this vulnerability to bypass firewall when users are using unencrypted IRC with nf_conntrack_irc configured.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: netfilter: nf_conntrack_irc message handling issue", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2663" }, { "category": "external", "summary": "RHBZ#2123056", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123056" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2663", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2663" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2663", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2663" }, { "category": "external", "summary": "https://lore.kernel.org/netfilter-devel/20220826045658.100360-1-dgl@dgl.cx/T/", "url": "https://lore.kernel.org/netfilter-devel/20220826045658.100360-1-dgl@dgl.cx/T/" } ], "release_date": "2022-08-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module nf_conntrack_irc from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: netfilter: nf_conntrack_irc message handling issue" }, { "cve": "CVE-2022-3028", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2122228" } ], "notes": [ { "category": "description", "text": "A race condition was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: race condition in xfrm_probe_algs can lead to OOB read/write", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Moderate impact because it can only be triggered by a privileged local user (with CAP_NET_ADMIN or root).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3028" }, { "category": "external", "summary": "RHBZ#2122228", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122228" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3028", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3028" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3028", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3028" }, { "category": "external", "summary": "https://github.com/torvalds/linux/commit/ba953a9d89a00c078b85f4b190bc1dde66fe16b5", "url": "https://github.com/torvalds/linux/commit/ba953a9d89a00c078b85f4b190bc1dde66fe16b5" } ], "release_date": "2022-07-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: race condition in xfrm_probe_algs can lead to OOB read/write" }, { "cve": "CVE-2022-3435", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2022-10-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2133490" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory read flaw was found in the Linux kernel. The IPv4 Handler component may delete IPv4 routes containing a multipath spec while the fib_info is using a nexthop object. This issue allows a local attacker access to unauthorized data.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds read in fib_nh_match of the file net/ipv4/fib_semantics.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3435" }, { "category": "external", "summary": "RHBZ#2133490", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133490" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3435", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3435" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3435", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3435" }, { "category": "external", "summary": "https://lore.kernel.org/netdev/20221005181257.8897-1-dsahern@kernel.org/T/#u", "url": "https://lore.kernel.org/netdev/20221005181257.8897-1-dsahern@kernel.org/T/#u" } ], "release_date": "2022-10-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "No known mitigation available.", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out-of-bounds read in fib_nh_match of the file net/ipv4/fib_semantics.c" }, { "cve": "CVE-2022-3522", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2022-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2150979" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in hugetlb_no_page in the mm/hugetlb.c file in the Linux Kernel, where a manipulation leads to a race condition. This flaw may allow a local attacker to cause a denial of service and can lead to a kernel information leak issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: race condition in hugetlb_no_page() in mm/hugetlb.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3522" }, { "category": "external", "summary": "RHBZ#2150979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150979" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3522", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3522" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3522", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3522" }, { "category": "external", "summary": "https://lore.kernel.org/all/20221004193400.110155-3-peterx@redhat.com/T/#u", "url": "https://lore.kernel.org/all/20221004193400.110155-3-peterx@redhat.com/T/#u" } ], "release_date": "2022-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: race condition in hugetlb_no_page() in mm/hugetlb.c" }, { "cve": "CVE-2022-3524", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2022-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2150947" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the Linux kernel\u2019s IPv6 functionality in how a user triggers the setsockopt of the IPV6_ADDRFORM and IPV6_DSTOPTS type. This flaw allows a user to crash the system if the setsockopt function is being called simultaneously with the IPV6_ADDRFORM type and other processes with the IPV6_DSTOPTS type. This issue is unlikely to happen unless a local process triggers IPV6_ADDRFORM.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak in ipv6_renew_options()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3524" }, { "category": "external", "summary": "RHBZ#2150947", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150947" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3524", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3524" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3524", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3524" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11" } ], "release_date": "2022-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: memory leak in ipv6_renew_options()" }, { "cve": "CVE-2022-3566", "cwe": { "id": "CWE-366", "name": "Race Condition within a Thread" }, "discovery_date": "2022-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2143893" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the tcp subsystem in the Linux Kernel, due to a data race around icsk-\u003eicsk_af_ops. This issue could allow an attacker to leak internal kernel information.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: data races around icsk-\u003eicsk_af_ops in do_ipv6_setsockopt", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3566" }, { "category": "external", "summary": "RHBZ#2143893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143893" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3566", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3566" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3566", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3566" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57" } ], "release_date": "2022-10-06T06:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: data races around icsk-\u003eicsk_af_ops in do_ipv6_setsockopt" }, { "cve": "CVE-2022-3567", "cwe": { "id": "CWE-421", "name": "Race Condition During Access to Alternate Channel" }, "discovery_date": "2022-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2143943" } ], "notes": [ { "category": "description", "text": "A data race problem was found in sk-\u003esk_prot in the network subsystem in ipv6 in the Linux kernel. This issue occurs while some functions access critical data, leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: data races around sk-\u003esk_prot", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3567" }, { "category": "external", "summary": "RHBZ#2143943", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143943" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3567", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3567" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3567", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3567" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6" } ], "release_date": "2022-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: data races around sk-\u003esk_prot" }, { "cve": "CVE-2022-3619", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2022-12-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2154235" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the Linux kernel\u2019s L2CAP bluetooth functionality. This issue occurs when a user generates malicious packets, triggering the l2cap_recv_acldata function. This flaw allows a local or bluetooth connection user to potentially crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3619" }, { "category": "external", "summary": "RHBZ#2154235", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154235" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3619", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3619" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=97097c85c088e11651146da32a4e1cdb9dfa6193", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=97097c85c088e11651146da32a4e1cdb9dfa6193" }, { "category": "external", "summary": "https://vuldb.com/?id.211918", "url": "https://vuldb.com/?id.211918" } ], "release_date": "2022-10-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the customer portal at https://access.redhat.com/solutions/268293.\n\nAlternatively, bluetooth can be disabled within the hardware or at the BIOS level, which will also provide effective mitigation as the kernel will not detect Bluetooth hardware on the system.", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c" }, { "cve": "CVE-2022-3623", "cwe": { "id": "CWE-123", "name": "Write-what-where Condition" }, "discovery_date": "2023-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2165721" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in follow_page_pte in mm/gup.c in the Linux Kernel. This issue occurs due to a race problem which can poison the page table entry and cause a denial-of-service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3623" }, { "category": "external", "summary": "RHBZ#2165721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165721" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3623", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3623" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3623", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3623" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=fac35ba763ed07ba93154c95ffc0c4a55023707f", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=fac35ba763ed07ba93154c95ffc0c4a55023707f" } ], "release_date": "2022-09-01T06:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry" }, { "cve": "CVE-2022-3625", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-11-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2144720" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Netlink device interface implementation in the Linux kernel that improperly handled certain error conditions, leading to a use-after-free issue with some network device drivers. A local attacker with admin access to the network device could use this to cause a denial of service (system crash) or execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free after failed devlink reload in devlink_param_get", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3625" }, { "category": "external", "summary": "RHBZ#2144720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2144720" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3625", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3625" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3625", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3625" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=6b4db2e528f650c7fb712961aac36455468d5902", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=6b4db2e528f650c7fb712961aac36455468d5902" } ], "release_date": "2022-08-09T08:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free after failed devlink reload in devlink_param_get" }, { "cve": "CVE-2022-3628", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-12-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2150960" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: USB-accessible buffer overflow in brcmfmac", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3628" }, { "category": "external", "summary": "RHBZ#2150960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150960" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3628", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3628" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3628", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3628" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295" }, { "category": "external", "summary": "https://seclists.org/oss-sec/2022/q4/60", "url": "https://seclists.org/oss-sec/2022/q4/60" } ], "release_date": "2022-10-22T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "To mitigate this issue, prevent the brcmfmac module from being loaded. See https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: USB-accessible buffer overflow in brcmfmac" }, { "cve": "CVE-2022-3640", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-11-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2139610" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Linux Kernel in the l2cap_conn_del in net/bluetooth/l2cap_core.c function in the Bluetooth component. This issue leads to a use-after-free problem.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3640" }, { "category": "external", "summary": "RHBZ#2139610", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139610" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3640", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3640" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3640", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3640" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=42cf46dea905a80f6de218e837ba4d4cc33d6979", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=42cf46dea905a80f6de218e837ba4d4cc33d6979" } ], "release_date": "2022-10-17T12:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c" }, { "cve": "CVE-2022-3707", "cwe": { "id": "CWE-415", "name": "Double Free" }, "discovery_date": "2022-10-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2137979" } ], "notes": [ { "category": "description", "text": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3707" }, { "category": "external", "summary": "RHBZ#2137979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137979" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3707", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3707" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3707", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3707" }, { "category": "external", "summary": "https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz@163.com/", "url": "https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz@163.com/" } ], "release_date": "2022-10-07T08:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed" }, { "cve": "CVE-2022-4128", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2022-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2134380" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference issue was discovered in the Linux kernel. This issue occurs in the MPTCP protocol when traversing the subflow list at disconnect time. A local user could potentially crash the system, causing a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mptcp: NULL pointer dereference in subflow traversal at disconnect time", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-4128" }, { "category": "external", "summary": "RHBZ#2134380", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134380" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-4128", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4128" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4128", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4128" } ], "release_date": "2022-07-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: mptcp: NULL pointer dereference in subflow traversal at disconnect time" }, { "cve": "CVE-2022-4129", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2022-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2134528" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-4129" }, { "category": "external", "summary": "RHBZ#2134528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134528" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-4129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4129" } ], "release_date": "2022-08-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference" }, { "cve": "CVE-2022-4662", "cwe": { "id": "CWE-455", "name": "Non-exit on Failed Initialization" }, "discovery_date": "2022-12-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2155788" } ], "notes": [ { "category": "description", "text": "An incorrect access control flaw was found in the Linux kernel USB core subsystem. When attaching a malicious usb device, the recursive locking violation in usb-storage can cause the kernel to deadlock. This issue could allow a local user to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Recursive locking violation in usb-storage that can cause the kernel to deadlock", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-4662" }, { "category": "external", "summary": "RHBZ#2155788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-4662", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4662" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4662", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4662" }, { "category": "external", "summary": "https://lore.kernel.org/all/20220913140355.910732567@linuxfoundation.org/", "url": "https://lore.kernel.org/all/20220913140355.910732567@linuxfoundation.org/" }, { "category": "external", "summary": "https://lore.kernel.org/all/CAB7eexLLApHJwZfMQ=X-PtRhw0BgO+5KcSMS05FNUYejJXqtSA@mail.gmail.com/", "url": "https://lore.kernel.org/all/CAB7eexLLApHJwZfMQ=X-PtRhw0BgO+5KcSMS05FNUYejJXqtSA@mail.gmail.com/" } ], "release_date": "2022-09-13T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Recursive locking violation in usb-storage that can cause the kernel to deadlock" }, { "cve": "CVE-2022-20141", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "discovery_date": "2022-08-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2114937" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s IGMP protocol in how a user triggers a race condition in the ip_check_mc_rcu function. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-20141" }, { "category": "external", "summary": "RHBZ#2114937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114937" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-20141", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20141" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-20141", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20141" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/igmp.c?h=v5.19\u0026id=23d2b94043ca8835bd1e67749020e839f396a1c2", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/igmp.c?h=v5.19\u0026id=23d2b94043ca8835bd1e67749020e839f396a1c2" } ], "release_date": "2021-07-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets" }, { "cve": "CVE-2022-21505", "cwe": { "id": "CWE-305", "name": "Authentication Bypass by Primary Weakness" }, "discovery_date": "2022-07-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2106830" } ], "notes": [ { "category": "description", "text": "An authentication bypass flaw was found in the Linux kernel\u2019s IMA policy when a user performs lockdown. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: lockdown bypass using IMA", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21505" }, { "category": "external", "summary": "RHBZ#2106830", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106830" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21505", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21505" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21505", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21505" } ], "release_date": "2022-07-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: lockdown bypass using IMA" }, { "cve": "CVE-2022-28388", "cwe": { "id": "CWE-415", "name": "Double Free" }, "discovery_date": "2022-04-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073091" } ], "notes": [ { "category": "description", "text": "A double-free flaw was found in the Linux kernel\u0027s USB2CAN interface implementation. This issue could allow a local user to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is Moderate because this case doesn\u0027t lead to a kernel crash as result of the pointers reference check preventing actual second memory free. The only known attack scenario is the possibility of a denial of service.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28388" }, { "category": "external", "summary": "RHBZ#2073091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073091" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28388", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28388" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28388", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28388" } ], "release_date": "2022-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "To mitigate this issue, prevent module usb_8dev from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c" }, { "cve": "CVE-2022-33743", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107924" } ], "notes": [ { "category": "description", "text": "An incomplete cleanup flaw was found in the Linux kernel\u2019s Xen networking XDP (eXpress Data Path) subsystem. This flaw allows a local user to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: network backend may cause Linux netfront to use freed SKBs (XSA-405)", "title": "Vulnerability summary" }, { "category": "other", "text": "Keeping this flaw Moderate, because only a denial of service is possible (A:H) as result of memory leak problem. The memory leak can happen because instead of removing skb, keeping it in the networking stack forever. The CVSS score is higher, than usually for Moderate, because kept \"C:H\" and \"I:H\" too in case maybe potentially would be possible privilege escalation too.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-33743" }, { "category": "external", "summary": "RHBZ#2107924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107924" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-33743", "url": "https://www.cve.org/CVERecord?id=CVE-2022-33743" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-33743", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-33743" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/drivers/net/xen-netfront.c?h=v5.19-rc7\u0026id=f63c2c2032c2e3caad9add3b82cc6e91c376fd26", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/drivers/net/xen-netfront.c?h=v5.19-rc7\u0026id=f63c2c2032c2e3caad9add3b82cc6e91c376fd26" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2022/07/05/5", "url": "https://www.openwall.com/lists/oss-security/2022/07/05/5" } ], "release_date": "2022-07-04T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: network backend may cause Linux netfront to use freed SKBs (XSA-405)" }, { "cve": "CVE-2022-36280", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-09-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2133450" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory write vulnerability was found in the Linux kernel\u0027s vmwgfx driver in vmw_kms_cursor_snoop due to a missing check of a memcpy length. This flaw allows a local, unprivileged attacker with access to either the /dev/dri/card0 or /dev/dri/rendererD128 and able to issue an ioctl() on the resulting file descriptor, to crash the system, causing a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: vmwgfx: out-of-bounds write in vmw_kms_cursor_snoop", "title": "Vulnerability summary" }, { "category": "other", "text": "Systems making use of the vmwgfx driver are potentially affected by this flaw; systems without the vmwgfx driver loaded are not affected by this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-36280" }, { "category": "external", "summary": "RHBZ#2133450", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133450" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-36280", "url": "https://www.cve.org/CVERecord?id=CVE-2022-36280" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-36280", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36280" } ], "release_date": "2022-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "To mitigate this issue, it is possible to prevent the affected code from being loaded by blacklisting the vmwgfx kernel module. For instructions relating to blacklisting a kernel module, please see https://access.redhat.com/solutions/41278.", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: vmwgfx: out-of-bounds write in vmw_kms_cursor_snoop" }, { "cve": "CVE-2022-36879", "cwe": { "id": "CWE-911", "name": "Improper Update of Reference Count" }, "discovery_date": "2022-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2119855" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s IP framework for transforming packets (XFRM subsystem). An error while resolving policies in xfrm_bundle_lookup causes the refcount to drop twice, leading to a possible crash and a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-36879" }, { "category": "external", "summary": "RHBZ#2119855", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119855" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-36879", "url": "https://www.cve.org/CVERecord?id=CVE-2022-36879" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-36879", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36879" } ], "release_date": "2022-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice" }, { "cve": "CVE-2022-39188", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-09-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2130141" } ], "notes": [ { "category": "description", "text": "A flaw was found in include/asm-generic/tlb.h in the Linux kernel due to a race condition (unmap_mapping_range versus munmap). This issue allows a device driver to free a page while it still has stale TLB entries.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only occurs in situations with VM_PFNMAP virtual memory areas (VMAs).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-39188" }, { "category": "external", "summary": "RHBZ#2130141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130141" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-39188", "url": "https://www.cve.org/CVERecord?id=CVE-2022-39188" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-39188", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-39188" }, { "category": "external", "summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2329", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2329" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b67fbebd4cf980aecbcc750e1462128bffe8ae15", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b67fbebd4cf980aecbcc750e1462128bffe8ae15" }, { "category": "external", "summary": "https://lore.kernel.org/stable/20220831191348.3388208-1-jannh@google.com/T/#u", "url": "https://lore.kernel.org/stable/20220831191348.3388208-1-jannh@google.com/T/#u" } ], "release_date": "2022-07-06T16:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry" }, { "cve": "CVE-2022-39189", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-09-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2124788" } ], "notes": [ { "category": "description", "text": "A flaw was found in the x86 KVM subsystem in kvm_steal_time_set_preempted in arch/x86/kvm/x86.c in the Linux kernel. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning", "title": "Vulnerability summary" }, { "category": "other", "text": "With the current usecase, attacker need a root privileges to exploit this flaw, however there may have ways to defeat this either, but in both cases it seems that Attack Complexity is high (AC:H)", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-39189" }, { "category": "external", "summary": "RHBZ#2124788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-39189", "url": "https://www.cve.org/CVERecord?id=CVE-2022-39189" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-39189", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-39189" }, { "category": "external", "summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2309", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2309" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cd88243c7e03845a450795e134b488fc2afb736", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cd88243c7e03845a450795e134b488fc2afb736" } ], "release_date": "2022-05-30T03:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning" }, { "cve": "CVE-2022-41674", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-10-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2134377" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw was found in the u8 overflow in cfg80211_update_notlisted_nontrans() in net/wireless/scan.c in the Linux kernel\u2019s wifi subcomponent. This flaw allows an attacker to crash the system or leak internal kernel information.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: u8 overflow problem in cfg80211_update_notlisted_nontrans()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41674" }, { "category": "external", "summary": "RHBZ#2134377", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134377" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41674", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41674" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41674", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41674" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2022/10/13/2", "url": "https://www.openwall.com/lists/oss-security/2022/10/13/2" } ], "release_date": "2022-10-13T10:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: u8 overflow problem in cfg80211_update_notlisted_nontrans()" }, { "cve": "CVE-2022-42703", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-10-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2133483" } ], "notes": [ { "category": "description", "text": "A memory leak flaw with use-after-free capability was found in the Linux kernel. The VMA mm/rmap.c functionality in the is_mergeable_anon_vma() function continuously forks, using memory operations to trigger an incorrect reuse of leaf anon_vma. This issue allows a local attacker to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free related to leaf anon_vma double reuse", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42703" }, { "category": "external", "summary": "RHBZ#2133483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133483" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42703", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42703" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42703", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42703" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2555283eb40df89945557273121e9393ef9b542b", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2555283eb40df89945557273121e9393ef9b542b" } ], "release_date": "2022-10-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free related to leaf anon_vma double reuse" }, { "cve": "CVE-2022-42720", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-10-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2134451" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in bss_ref_get in the net/wireless/scan.c in\u00a0the Linux kernel. This issue can lead to a denial of service or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in bss_ref_get in net/wireless/scan.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42720" }, { "category": "external", "summary": "RHBZ#2134451", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134451" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42720" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2022/10/13/2", "url": "https://www.openwall.com/lists/oss-security/2022/10/13/2" } ], "release_date": "2022-10-13T10:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria, comprised of ease of use and deployment, applicability to widespread installation base, and stability.", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in bss_ref_get in net/wireless/scan.c" }, { "cve": "CVE-2022-42721", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2022-10-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2134506" } ], "notes": [ { "category": "description", "text": "A list corruption flaw was found in cfg80211_add_nontrans_list in the net/wireless/scan.c function in the Linux kernel. This flaw could lead to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42721" }, { "category": "external", "summary": "RHBZ#2134506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134506" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42721", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42721" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42721", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42721" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2022/10/13/2", "url": "https://www.openwall.com/lists/oss-security/2022/10/13/2" } ], "release_date": "2022-10-13T10:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c" }, { "cve": "CVE-2022-42722", "cwe": { "id": "CWE-705", "name": "Incorrect Control Flow Scoping" }, "discovery_date": "2022-10-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2134517" } ], "notes": [ { "category": "description", "text": "A flaw was found in P2P-Device in wifi in ieee80211_rx_h_decrypt in net/mac80211/rx.c in the Linux kernel, leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Denial of service in beacon protection for P2P-device", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42722" }, { "category": "external", "summary": "RHBZ#2134517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134517" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42722", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42722" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42722", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42722" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2022/10/13/2", "url": "https://www.openwall.com/lists/oss-security/2022/10/13/2" } ], "release_date": "2022-10-13T10:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "To mitigate this issue, prevent module mac80211 from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Denial of service in beacon protection for P2P-device" }, { "cve": "CVE-2022-42896", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-11-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2147364" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u0027s implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_connect and l2cap_le_connect_req functions. An attacker with physical access within the range of standard Bluetooth transmission could execute code leaking kernel memory via Bluetooth if within proximity of the victim.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42896" }, { "category": "external", "summary": "RHBZ#2147364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147364" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42896", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42896" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42896", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42896" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-pf87-6c9q-jvm4", "url": "https://github.com/google/security-research/security/advisories/GHSA-pf87-6c9q-jvm4" } ], "release_date": "2022-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "This flaw can be mitigated by disabling Bluetooth on the operating system level. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. For instructions on how to disable Bluetooth on RHEL please refer to https://access.redhat.com/solutions/2682931.\n\nAlternatively Bluetooth can be disabled within the hardware or at BIOS level which will also provide an effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c" }, { "cve": "CVE-2022-43750", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-10-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2151270" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory write flaw in the Linux kernel\u2019s USB Monitor component was found in how a user with access to the /dev/usbmon can trigger it by an incorrect write to the memory of the usbmon. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory corruption in usbmon driver", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-43750" }, { "category": "external", "summary": "RHBZ#2151270", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151270" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-43750", "url": "https://www.cve.org/CVERecord?id=CVE-2022-43750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43750" }, { "category": "external", "summary": "https://github.com/torvalds/linux/commit/a659daf63d16aa883be42f3f34ff84235c302198", "url": "https://github.com/torvalds/linux/commit/a659daf63d16aa883be42f3f34ff84235c302198" } ], "release_date": "2022-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: memory corruption in usbmon driver" }, { "cve": "CVE-2022-47929", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2023-01-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2168246" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux kernel. This issue may allow a local unprivileged user to trigger a denial of service if the alloc_workqueue function return is not validated in time of failure, resulting in a system crash or leaked internal kernel information.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL pointer dereference in traffic control subsystem", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-47929" }, { "category": "external", "summary": "RHBZ#2168246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168246" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-47929", "url": "https://www.cve.org/CVERecord?id=CVE-2022-47929" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-47929", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-47929" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407" } ], "release_date": "2023-01-09T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "The mitigation is to disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n```\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n```", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: NULL pointer dereference in traffic control subsystem" }, { "cve": "CVE-2022-48695", "discovery_date": "2024-05-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2278999" } ], "notes": [ { "category": "description", "text": "A user after-free vulnerability was found in the Linux kernel in the refcount_t variable when performing the controller reset. This issue could lead to denial of service of the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: scsi: mpt3sas: Fix use-after-free warning", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-48695" }, { "category": "external", "summary": "RHBZ#2278999", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278999" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-48695", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48695" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48695", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48695" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024050348-CVE-2022-48695-8a9e@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024050348-CVE-2022-48695-8a9e@gregkh/T" } ], "release_date": "2024-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: scsi: mpt3sas: Fix use-after-free warning" }, { "acknowledgments": [ { "names": [ "Kyle Zeng" ] } ], "cve": "CVE-2023-0394", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2023-01-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2162120" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL pointer dereference in rawv6_push_pending_frames", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-0394" }, { "category": "external", "summary": "RHBZ#2162120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162120" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0394", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0394" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0394", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0394" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2023/01/18/2", "url": "https://www.openwall.com/lists/oss-security/2023/01/18/2" } ], "release_date": "2023-01-17T17:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: NULL pointer dereference in rawv6_push_pending_frames" }, { "cve": "CVE-2023-0461", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2176192" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net/ulp: use-after-free in listening ULP sockets", "title": "Vulnerability summary" }, { "category": "other", "text": "Versions of Red Hat Enterprise Linux before 8 are not affected by this vulnerability as they did not include the upstream commit 734942c (\"tcp: ULP infrastructure\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-0461" }, { "category": "external", "summary": "RHBZ#2176192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176192" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0461", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0461" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461" }, { "category": "external", "summary": "https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c", "url": "https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c" } ], "release_date": "2023-02-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "To mitigate this issue, prevent module tls from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: net/ulp: use-after-free in listening ULP sockets" }, { "acknowledgments": [ { "names": [ "Jann Horn" ], "organization": "Google Project Zero" } ], "cve": "CVE-2023-0590", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2165741" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 (\"net: sched: fix race condition in qdisc_graft()\") not applied yet, then kernel could be affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free due to race condition in qdisc_graft()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-0590" }, { "category": "external", "summary": "RHBZ#2165741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0590", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0590" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0590", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0590" }, { "category": "external", "summary": "https://lore.kernel.org/all/20221018203258.2793282-1-edumazet@google.com/", "url": "https://lore.kernel.org/all/20221018203258.2793282-1-edumazet@google.com/" } ], "release_date": "2022-10-18T06:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free due to race condition in qdisc_graft()" }, { "acknowledgments": [ { "names": [ "Pumpkin (@u1f383)" ], "organization": "DEVCORE Internship Program, and NYCU Software Security LAB" } ], "cve": "CVE-2023-1195", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-12-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2154171" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in reconn_set_ipaddr_from_hostname in fs/cifs/connect.c in the Linux kernel. The issue occurs when it forgets to set the free pointer server-\u003ehostname to NULL, leading to an invalid pointer request.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-1195" }, { "category": "external", "summary": "RHBZ#2154171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154171" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1195", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1195" }, { "category": "external", "summary": "https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621", "url": "https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621" } ], "release_date": "2022-10-02T06:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c" }, { "acknowledgments": [ { "names": [ "Wei Chen" ] } ], "cve": "CVE-2023-1382", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2023-03-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2177371" } ], "notes": [ { "category": "description", "text": "A data race flaw was found in the Linux kernel, between where con is allocated and con-\u003esock is set. This issue leads to a NULL pointer dereference when accessing con-\u003esock-\u003esk in net/tipc/topsrv.c in the tipc protocol in the Linux kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: denial of service in tipc_conn_close", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-1382" }, { "category": "external", "summary": "RHBZ#2177371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177371" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1382", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1382" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1382", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1382" }, { "category": "external", "summary": "https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin@gmail.com/T/#u", "url": "https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin@gmail.com/T/#u" } ], "release_date": "2022-11-18T06:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "This flaw can be mitigated by preventing the affected transparent inter-process communication (TIPC) protocol kernel module from loading during the boot time. Ensure the module is added into the blacklist file.\n~~~\nRefer: \nHow do I blacklist a kernel module to prevent it from loading automatically? \nhttps://access.redhat.com/solutions/41278\n~~~", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: denial of service in tipc_conn_close" }, { "acknowledgments": [ { "names": [ "Wei Chen" ] } ], "cve": "CVE-2023-2177", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2023-04-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2187953" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference issue was found in the SCTP network protocol in net/sctp/stream_sched.c in the Linux kernel. If stream_in allocation fails, stream_out is freed, which would be accessed further. This flaw allows a local user to crash the system or potentially cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-2177" }, { "category": "external", "summary": "RHBZ#2187953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-2177", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2177" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-2177", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2177" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=181d8d2066c0", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=181d8d2066c0" } ], "release_date": "2022-07-25T12:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common" }, { "cve": "CVE-2023-2513", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-05-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2193097" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the Linux kernel\u0027s ext4 filesystem in the way it handled the extra inode size for extended attributes. This flaw allows a privileged local user to cause a system crash or other undefined behaviors.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ext4: use-after-free in ext4_xattr_set_entry()", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as having Moderate impact because of the preconditions needed to trigger the issue. The vulnerability can be exploited by a regular user, but the filesystem should be mounted with `debug_want_extra_isize`=128 and the user must have write access to the filesystem. It\u0027s also important to emphasize that `debug_want_extra_isize` is a debug mount option and should never be used in production.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-2513" }, { "category": "external", "summary": "RHBZ#2193097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2193097" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-2513", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-2513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2513" } ], "release_date": "2022-06-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: ext4: use-after-free in ext4_xattr_set_entry()" }, { "cve": "CVE-2023-22998", "cwe": { "id": "CWE-436", "name": "Interpretation Conflict" }, "discovery_date": "2023-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2182429" } ], "notes": [ { "category": "description", "text": "In the Linux kernel before 6.0.3, drivers/gpu/drm/virtio/virtgpu_object.c misinterprets the drm_gem_shmem_get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: drm/virtio: improper return value check in virtio_gpu_object_shmem_init()", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6 and 7 are not affected by this flaw as they did not include the `virtio_gpu_object_shmem_init` function, introduced upstream in commit 2f2aa13 (\"drm/virtio: move virtio_gpu_mem_entry initialization to new function\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-22998" }, { "category": "external", "summary": "RHBZ#2182429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182429" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-22998", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22998" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-22998", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-22998" } ], "release_date": "2023-02-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: drm/virtio: improper return value check in virtio_gpu_object_shmem_init()" }, { "cve": "CVE-2023-52340", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-01-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257979" } ], "notes": [ { "category": "description", "text": "A flaw in the routing table size was found in the ICMPv6 handling of \"Packet Too Big\". The size of the routing table is regulated by periodic garbage collection. However, with \"Packet Too Big Messages\" it is possible to exceed the routing table size and garbage collector threshold. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ICMPv6 \u201cPacket Too Big\u201d packets force a DoS of the Linux kernel by forcing 100% CPU", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-52340" }, { "category": "external", "summary": "RHBZ#2257979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257979" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-52340", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52340" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52340", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52340" }, { "category": "external", "summary": "https://alas.aws.amazon.com/cve/html/CVE-2023-52340.html", "url": "https://alas.aws.amazon.com/cve/html/CVE-2023-52340.html" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=af6d10345ca76670c1b7c37799f0d5576ccef277", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=af6d10345ca76670c1b7c37799f0d5576ccef277" } ], "release_date": "2024-01-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:01:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2148" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src", "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64", "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: ICMPv6 \u201cPacket Too Big\u201d packets force a DoS of the Linux kernel by forcing 100% CPU" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.