rhsa-2023_2148
Vulnerability from csaf_redhat
Published
2023-05-09 10:01
Modified
2024-11-21 19:42
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update

Notes

Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896) * net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461) * hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch (CVE-2021-26341) * malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory (CVE-2021-33655) * possible race condition in drivers/tty/tty_buffers.c (CVE-2022-1462) * KVM: NULL pointer dereference in kvm_mmu_invpcid_gva (CVE-2022-1789) * use-after-free in free_pipe_info() could lead to privilege escalation (CVE-2022-1882) * KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks (CVE-2022-2196) * netfilter: nf_conntrack_irc message handling issue (CVE-2022-2663) * race condition in xfrm_probe_algs can lead to OOB read/write (CVE-2022-3028) * out-of-bounds read in fib_nh_match of the file net/ipv4/fib_semantics.c (CVE-2022-3435) * race condition in hugetlb_no_page() in mm/hugetlb.c (CVE-2022-3522) * memory leak in ipv6_renew_options() (CVE-2022-3524) * data races around icsk->icsk_af_ops in do_ipv6_setsockopt (CVE-2022-3566) * data races around sk->sk_prot (CVE-2022-3567) * memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c (CVE-2022-3619) * denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry (CVE-2022-3623) * use-after-free after failed devlink reload in devlink_param_get (CVE-2022-3625) * USB-accessible buffer overflow in brcmfmac (CVE-2022-3628) * use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c (CVE-2022-3640) * Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed (CVE-2022-3707) * mptcp: NULL pointer dereference in subflow traversal at disconnect time (CVE-2022-4128) * l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference (CVE-2022-4129) * igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets (CVE-2022-20141) * lockdown bypass using IMA (CVE-2022-21505) * double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c (CVE-2022-28388) * network backend may cause Linux netfront to use freed SKBs (XSA-405) (CVE-2022-33743) * unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry (CVE-2022-39188) * TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning (CVE-2022-39189) * u8 overflow problem in cfg80211_update_notlisted_nontrans() (CVE-2022-41674) * use-after-free related to leaf anon_vma double reuse (CVE-2022-42703) * use-after-free in bss_ref_get in net/wireless/scan.c (CVE-2022-42720) * BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c (CVE-2022-42721) * Denial of service in beacon protection for P2P-device (CVE-2022-42722) * memory corruption in usbmon driver (CVE-2022-43750) * NULL pointer dereference in traffic control subsystem (CVE-2022-47929) * NULL pointer dereference in rawv6_push_pending_frames (CVE-2023-0394) * use-after-free due to race condition in qdisc_graft() (CVE-2023-0590) * use-after-free caused by invalid pointer hostname in fs/cifs/connect.c (CVE-2023-1195) * denial of service in tipc_conn_close (CVE-2023-1382) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.2 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896)\n\n* net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)\n\n* hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch (CVE-2021-26341)\n\n* malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory (CVE-2021-33655)\n\n* possible race condition in drivers/tty/tty_buffers.c (CVE-2022-1462)\n\n* KVM: NULL pointer dereference in kvm_mmu_invpcid_gva (CVE-2022-1789)\n\n* use-after-free in free_pipe_info() could lead to privilege escalation (CVE-2022-1882)\n\n* KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks (CVE-2022-2196)\n\n* netfilter: nf_conntrack_irc message handling issue (CVE-2022-2663)\n\n* race condition in xfrm_probe_algs can lead to OOB read/write (CVE-2022-3028)\n\n* out-of-bounds read in fib_nh_match of the file net/ipv4/fib_semantics.c (CVE-2022-3435)\n\n* race condition in hugetlb_no_page() in mm/hugetlb.c (CVE-2022-3522)\n\n* memory leak in ipv6_renew_options() (CVE-2022-3524)\n\n* data races around icsk-\u003eicsk_af_ops in do_ipv6_setsockopt (CVE-2022-3566)\n\n* data races around sk-\u003esk_prot (CVE-2022-3567)\n\n* memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c (CVE-2022-3619)\n\n* denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry (CVE-2022-3623)\n\n* use-after-free after failed devlink reload in devlink_param_get (CVE-2022-3625)\n\n* USB-accessible buffer overflow in brcmfmac (CVE-2022-3628)\n\n* use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c (CVE-2022-3640)\n\n* Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed (CVE-2022-3707)\n\n* mptcp: NULL pointer dereference in subflow traversal at disconnect time (CVE-2022-4128)\n\n* l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference (CVE-2022-4129)\n\n* igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets (CVE-2022-20141)\n\n* lockdown bypass using IMA (CVE-2022-21505)\n\n* double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c (CVE-2022-28388)\n\n* network backend may cause Linux netfront to use freed SKBs (XSA-405) (CVE-2022-33743)\n\n* unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry (CVE-2022-39188)\n\n* TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning (CVE-2022-39189)\n\n* u8 overflow problem in cfg80211_update_notlisted_nontrans() (CVE-2022-41674)\n\n* use-after-free related to leaf anon_vma double reuse (CVE-2022-42703)\n\n* use-after-free in bss_ref_get in net/wireless/scan.c (CVE-2022-42720)\n\n* BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c (CVE-2022-42721)\n\n* Denial of service in beacon protection for P2P-device (CVE-2022-42722)\n\n* memory corruption in usbmon driver (CVE-2022-43750)\n\n* NULL pointer dereference in traffic control subsystem (CVE-2022-47929)\n\n* NULL pointer dereference in rawv6_push_pending_frames (CVE-2023-0394)\n\n* use-after-free due to race condition in qdisc_graft() (CVE-2023-0590)\n\n* use-after-free caused by invalid pointer hostname in fs/cifs/connect.c (CVE-2023-1195)\n\n* denial of service in tipc_conn_close (CVE-2023-1382)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.2 Release Notes linked from the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2023:2148",
        "url": "https://access.redhat.com/errata/RHSA-2023:2148"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index",
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index"
      },
      {
        "category": "external",
        "summary": "2061703",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061703"
      },
      {
        "category": "external",
        "summary": "2073091",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073091"
      },
      {
        "category": "external",
        "summary": "2078466",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078466"
      },
      {
        "category": "external",
        "summary": "2089701",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089701"
      },
      {
        "category": "external",
        "summary": "2090723",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090723"
      },
      {
        "category": "external",
        "summary": "2106830",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106830"
      },
      {
        "category": "external",
        "summary": "2107924",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107924"
      },
      {
        "category": "external",
        "summary": "2108691",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108691"
      },
      {
        "category": "external",
        "summary": "2114937",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114937"
      },
      {
        "category": "external",
        "summary": "2122228",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122228"
      },
      {
        "category": "external",
        "summary": "2123056",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123056"
      },
      {
        "category": "external",
        "summary": "2124788",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124788"
      },
      {
        "category": "external",
        "summary": "2130141",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130141"
      },
      {
        "category": "external",
        "summary": "2133483",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133483"
      },
      {
        "category": "external",
        "summary": "2133490",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133490"
      },
      {
        "category": "external",
        "summary": "2134377",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134377"
      },
      {
        "category": "external",
        "summary": "2134380",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134380"
      },
      {
        "category": "external",
        "summary": "2134451",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134451"
      },
      {
        "category": "external",
        "summary": "2134506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134506"
      },
      {
        "category": "external",
        "summary": "2134517",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134517"
      },
      {
        "category": "external",
        "summary": "2134528",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134528"
      },
      {
        "category": "external",
        "summary": "2137979",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137979"
      },
      {
        "category": "external",
        "summary": "2139610",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139610"
      },
      {
        "category": "external",
        "summary": "2143893",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143893"
      },
      {
        "category": "external",
        "summary": "2143943",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143943"
      },
      {
        "category": "external",
        "summary": "2144720",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2144720"
      },
      {
        "category": "external",
        "summary": "2147364",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147364"
      },
      {
        "category": "external",
        "summary": "2150947",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150947"
      },
      {
        "category": "external",
        "summary": "2150960",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150960"
      },
      {
        "category": "external",
        "summary": "2150979",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150979"
      },
      {
        "category": "external",
        "summary": "2151270",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151270"
      },
      {
        "category": "external",
        "summary": "2154171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154171"
      },
      {
        "category": "external",
        "summary": "2154235",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154235"
      },
      {
        "category": "external",
        "summary": "2160023",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160023"
      },
      {
        "category": "external",
        "summary": "2162120",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162120"
      },
      {
        "category": "external",
        "summary": "2165721",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165721"
      },
      {
        "category": "external",
        "summary": "2165741",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165741"
      },
      {
        "category": "external",
        "summary": "2168246",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168246"
      },
      {
        "category": "external",
        "summary": "2176192",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176192"
      },
      {
        "category": "external",
        "summary": "2177371",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177371"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2148.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
    "tracking": {
      "current_release_date": "2024-11-21T19:42:28+00:00",
      "generator": {
        "date": "2024-11-21T19:42:28+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2023:2148",
      "initial_release_date": "2023-05-09T10:01:50+00:00",
      "revision_history": [
        {
          "date": "2023-05-09T10:01:50+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2023-05-09T10:01:50+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-21T19:42:28+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux NFV (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux NFV (v. 9)",
                  "product_id": "NFV-9.2.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::nfv"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux RT (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux RT (v. 9)",
                  "product_id": "RT-9.2.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::realtime"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
                "product": {
                  "name": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
                  "product_id": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@5.14.0-284.11.1.rt14.296.el9_2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-core@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-core@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-core@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-kvm@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-modules@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-modules-core@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src"
        },
        "product_reference": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src"
        },
        "product_reference": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "AMD"
          ]
        }
      ],
      "cve": "CVE-2021-26341",
      "cwe": {
        "id": "CWE-552",
        "name": "Files or Directories Accessible to External Parties"
      },
      "discovery_date": "2022-03-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2061703"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in hw. This issue can cause AMD CPUs to transiently execute beyond unconditional direct branches.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-26341"
        },
        {
          "category": "external",
          "summary": "RHBZ#2061703",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061703"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-26341",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-26341"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26341",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26341"
        },
        {
          "category": "external",
          "summary": "https://grsecurity.net/amd_branch_mispredictor_part_2_where_no_cpu_has_gone_before",
          "url": "https://grsecurity.net/amd_branch_mispredictor_part_2_where_no_cpu_has_gone_before"
        },
        {
          "category": "external",
          "summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1026",
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1026"
        },
        {
          "category": "external",
          "summary": "https://www.amd.com/system/files/documents/software-techniques-for-managing-speculation.pdf",
          "url": "https://www.amd.com/system/files/documents/software-techniques-for-managing-speculation.pdf"
        }
      ],
      "release_date": "2022-03-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch"
    },
    {
      "cve": "CVE-2021-33631",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "discovery_date": "2024-01-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2261976"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the openEuler kernel in Linux filesystem modules that allows an integer overflow via mounting a corrupted filesystem. This issue affects the openEuler kernel in versions from 4.19.90 through 4.19.90-2401.3 and 5.10.0-60.18.0 through 5.10.0-183.0.0.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: ext4: kernel bug in ext4_write_inline_data_end()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat has protection mechanisms in place against buffer overflows, such as FORTIFY_SOURCE, Position Independent Executables or Stack Smashing Protection.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-33631"
        },
        {
          "category": "external",
          "summary": "RHBZ#2261976",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2261976"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33631",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-33631"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33631",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33631"
        },
        {
          "category": "external",
          "summary": "https://seclists.org/oss-sec/2024/q1/65",
          "url": "https://seclists.org/oss-sec/2024/q1/65"
        }
      ],
      "release_date": "2024-01-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: ext4: kernel bug in ext4_write_inline_data_end()"
    },
    {
      "cve": "CVE-2021-33655",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2022-07-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2108691"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the Linux kernel\u2019s framebuffer-based console driver functionality in the way a user triggers ioctl FBIOPUT_VSCREENINFO with malicious data. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-33655"
        },
        {
          "category": "external",
          "summary": "RHBZ#2108691",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108691"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33655",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-33655"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33655",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33655"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4"
        }
      ],
      "release_date": "2022-07-08T09:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory"
    },
    {
      "cve": "CVE-2021-47560",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2024-05-24T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2283389"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in the Linux kernel\u0027s mlxsw spectrum driver, where processing port up/down events leads to a NULL pointer dereference. This issue occurs when the driver fails to handle events for the CPU port, which exists but lacks a corresponding network device, resulting in system crashes.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: mlxsw: spectrum: Protect driver from buggy firmware",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-47560"
        },
        {
          "category": "external",
          "summary": "RHBZ#2283389",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283389"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-47560",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-47560"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47560",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47560"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2024052451-CVE-2021-47560-4a52@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2024052451-CVE-2021-47560-4a52@gregkh/T"
        }
      ],
      "release_date": "2024-05-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: mlxsw: spectrum: Protect driver from buggy firmware"
    },
    {
      "cve": "CVE-2021-47592",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2024-06-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2293235"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: stmmac: fix tc flower deletion for VLAN priority Rx steering\n\nTo replicate the issue:-\n\n1) Add 1 flower filter for VLAN Priority based frame steering:-\n$ IFDEVNAME=eth0\n$ tc qdisc add dev $IFDEVNAME ingress\n$ tc qdisc add dev $IFDEVNAME root mqprio num_tc 8 \\\n   map 0 1 2 3 4 5 6 7 0 0 0 0 0 0 0 0 \\\n   queues 1@0 1@1 1@2 1@3 1@4 1@5 1@6 1@7 hw 0\n$ tc filter add dev $IFDEVNAME parent ffff: protocol 802.1Q \\\n   flower vlan_prio 0 hw_tc 0\n\n2) Get the \u0027pref\u0027 id\n$ tc filter show dev $IFDEVNAME ingress\n\n3) Delete a specific tc flower record (say pref 49151)\n$ tc filter del dev $IFDEVNAME parent ffff: pref 49151\n\nFrom dmesg, we will observe kernel NULL pointer ooops\n\n[  197.170464] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[  197.171367] #PF: supervisor read access in kernel mode\n[  197.171367] #PF: error_code(0x0000) - not-present page\n[  197.171367] PGD 0 P4D 0\n[  197.171367] Oops: 0000 [#1] PREEMPT SMP NOPTI\n\n\u003csnip\u003e\n\n[  197.171367] RIP: 0010:tc_setup_cls+0x20b/0x4a0 [stmmac]\n\n\u003csnip\u003e\n\n[  197.171367] Call Trace:\n[  197.171367]  \u003cTASK\u003e\n[  197.171367]  ? __stmmac_disable_all_queues+0xa8/0xe0 [stmmac]\n[  197.171367]  stmmac_setup_tc_block_cb+0x70/0x110 [stmmac]\n[  197.171367]  tc_setup_cb_destroy+0xb3/0x180\n[  197.171367]  fl_hw_destroy_filter+0x94/0xc0 [cls_flower]\n\nThe above issue is due to previous incorrect implementation of\ntc_del_vlan_flow(), shown below, that uses flow_cls_offload_flow_rule()\nto get struct flow_rule *rule which is no longer valid for tc filter\ndelete operation.\n\n  struct flow_rule *rule = flow_cls_offload_flow_rule(cls);\n  struct flow_dissector *dissector = rule-\u003ematch.dissector;\n\nSo, to ensure tc_del_vlan_flow() deletes the right VLAN cls record for\nearlier configured RX queue (configured by hw_tc) in tc_add_vlan_flow(),\nthis patch introduces stmmac_rfs_entry as driver-side flow_cls_offload\nrecord for \u0027RX frame steering\u0027 tc flower, currently used for VLAN\npriority. The implementation has taken consideration for future extension\nto include other type RX frame steering such as EtherType based.\n\nv2:\n - Clean up overly extensive backtrace and rewrite git message to better\n   explain the kernel NULL pointer issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: net: stmmac: fix tc flower deletion for VLAN priority Rx steering",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-47592"
        },
        {
          "category": "external",
          "summary": "RHBZ#2293235",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293235"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-47592",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-47592"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47592",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47592"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47592-7ca6@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47592-7ca6@gregkh/T"
        }
      ],
      "release_date": "2024-06-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: net: stmmac: fix tc flower deletion for VLAN priority Rx steering"
    },
    {
      "cve": "CVE-2022-1462",
      "cwe": {
        "id": "CWE-366",
        "name": "Race Condition within a Thread"
      },
      "discovery_date": "2022-04-25T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2078466"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds read flaw was found in the Linux kernel\u2019s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: possible race condition in drivers/tty/tty_buffers.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1462"
        },
        {
          "category": "external",
          "summary": "RHBZ#2078466",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078466"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1462",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1462"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1462",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1462"
        },
        {
          "category": "external",
          "summary": "https://seclists.org/oss-sec/2022/q2/155",
          "url": "https://seclists.org/oss-sec/2022/q2/155"
        }
      ],
      "release_date": "2022-05-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: possible race condition in drivers/tty/tty_buffers.c"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Qiuhao Li"
          ],
          "organization": "Harbin Institute of Technology"
        },
        {
          "names": [
            "Yongkang Jia",
            "Gaoning Pan"
          ],
          "organization": "Zhejiang University"
        }
      ],
      "cve": "CVE-2022-1789",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-05-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2090723"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in KVM. With shadow paging enabled if INVPCID is executed with CR0.PG=0, the invlpg callback is not set, and the result is a NULL pointer dereference. This flaw allows a guest user to cause a kernel oops condition on the host, resulting in a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Enterprise Linux 6 and 7 did not provide support for INVPCID in shadow paging mode and therefore are not affected by this issue.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1789"
        },
        {
          "category": "external",
          "summary": "RHBZ#2090723",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090723"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1789",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1789"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1789",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1789"
        },
        {
          "category": "external",
          "summary": "https://github.com/advisories/GHSA-v8pq-23qj-q7x7",
          "url": "https://github.com/advisories/GHSA-v8pq-23qj-q7x7"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2022/05/25/2",
          "url": "https://www.openwall.com/lists/oss-security/2022/05/25/2"
        }
      ],
      "release_date": "2022-05-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "elijahbai"
          ]
        }
      ],
      "cve": "CVE-2022-1882",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-05-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2089701"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in free_pipe_info() could lead to privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1882"
        },
        {
          "category": "external",
          "summary": "RHBZ#2089701",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089701"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1882",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1882"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1882",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1882"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/linus/353f7988dd8413c4",
          "url": "https://git.kernel.org/linus/353f7988dd8413c4"
        }
      ],
      "release_date": "2022-05-07T09:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in free_pipe_info() could lead to privilege escalation"
    },
    {
      "cve": "CVE-2022-2196",
      "cwe": {
        "id": "CWE-1188",
        "name": "Initialization of a Resource with an Insecure Default"
      },
      "discovery_date": "2023-01-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2160023"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the KVM\u0027s Intel nested virtualization feature (nVMX). Since L1 and L2 shared branch prediction modes (guest-user and guest-kernel), KVM did not protect indirect branches in L1 from steering by a malicious agent in L2. This could allow a malicious nested guest to carry out Spectre v2 attacks against L1 due to a missing IBPB at VM-exit time.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat currently provides the nested virtualization feature as a Technology Preview. Nested virtualization is therefore unsupported for production use. For more information please refer to https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-2196"
        },
        {
          "category": "external",
          "summary": "RHBZ#2160023",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160023"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2196",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-2196"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2196",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2196"
        }
      ],
      "release_date": "2022-09-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_intel\n# modprobe kvm_intel nested=0\n```",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks"
    },
    {
      "cve": "CVE-2022-2663",
      "cwe": {
        "id": "CWE-923",
        "name": "Improper Restriction of Communication Channel to Intended Endpoints"
      },
      "discovery_date": "2022-08-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2123056"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and it incorrectly matches on the message. An attacker could exploit this vulnerability to bypass firewall when users are using unencrypted IRC with nf_conntrack_irc configured.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: netfilter: nf_conntrack_irc message handling issue",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-2663"
        },
        {
          "category": "external",
          "summary": "RHBZ#2123056",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123056"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2663",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2663",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2663"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/netfilter-devel/20220826045658.100360-1-dgl@dgl.cx/T/",
          "url": "https://lore.kernel.org/netfilter-devel/20220826045658.100360-1-dgl@dgl.cx/T/"
        }
      ],
      "release_date": "2022-08-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent the module nf_conntrack_irc from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: netfilter: nf_conntrack_irc message handling issue"
    },
    {
      "cve": "CVE-2022-3028",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2022-08-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2122228"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A race condition was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition in xfrm_probe_algs can lead to OOB read/write",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is rated as having a Moderate impact because it can only be triggered by a privileged local user (with CAP_NET_ADMIN or root).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3028"
        },
        {
          "category": "external",
          "summary": "RHBZ#2122228",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122228"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3028",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3028"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3028",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3028"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/ba953a9d89a00c078b85f4b190bc1dde66fe16b5",
          "url": "https://github.com/torvalds/linux/commit/ba953a9d89a00c078b85f4b190bc1dde66fe16b5"
        }
      ],
      "release_date": "2022-07-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: race condition in xfrm_probe_algs can lead to OOB read/write"
    },
    {
      "cve": "CVE-2022-3435",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2022-10-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2133490"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds memory read flaw was found in the Linux kernel. The IPv4 Handler component may delete IPv4 routes containing a multipath spec while the fib_info is using a nexthop object. This issue allows a local attacker access to unauthorized data.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds read in fib_nh_match of the file net/ipv4/fib_semantics.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3435"
        },
        {
          "category": "external",
          "summary": "RHBZ#2133490",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133490"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3435",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3435"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3435",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3435"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/netdev/20221005181257.8897-1-dsahern@kernel.org/T/#u",
          "url": "https://lore.kernel.org/netdev/20221005181257.8897-1-dsahern@kernel.org/T/#u"
        }
      ],
      "release_date": "2022-10-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "No known mitigation available.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds read in fib_nh_match of the file net/ipv4/fib_semantics.c"
    },
    {
      "cve": "CVE-2022-3522",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2022-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2150979"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in hugetlb_no_page in the mm/hugetlb.c file in the Linux Kernel, where a manipulation leads to a race condition. This flaw may allow a local attacker to cause a denial of service and can lead to a kernel information leak issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition in hugetlb_no_page() in mm/hugetlb.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3522"
        },
        {
          "category": "external",
          "summary": "RHBZ#2150979",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150979"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3522",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3522"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3522",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3522"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/all/20221004193400.110155-3-peterx@redhat.com/T/#u",
          "url": "https://lore.kernel.org/all/20221004193400.110155-3-peterx@redhat.com/T/#u"
        }
      ],
      "release_date": "2022-10-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: race condition in hugetlb_no_page() in mm/hugetlb.c"
    },
    {
      "cve": "CVE-2022-3524",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2022-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2150947"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak flaw was found in the Linux kernel\u2019s IPv6 functionality in how a user triggers the setsockopt of the IPV6_ADDRFORM and IPV6_DSTOPTS type. This flaw allows a user to crash the system if the setsockopt function is being called simultaneously with the IPV6_ADDRFORM type and other processes with the IPV6_DSTOPTS type. This issue is unlikely to happen unless a local process triggers IPV6_ADDRFORM.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory leak in ipv6_renew_options()",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3524"
        },
        {
          "category": "external",
          "summary": "RHBZ#2150947",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150947"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3524",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3524"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3524",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3524"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11"
        }
      ],
      "release_date": "2022-10-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: memory leak in ipv6_renew_options()"
    },
    {
      "cve": "CVE-2022-3566",
      "cwe": {
        "id": "CWE-366",
        "name": "Race Condition within a Thread"
      },
      "discovery_date": "2022-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2143893"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in the tcp subsystem in the Linux Kernel, due to a data race around icsk-\u003eicsk_af_ops. This issue could allow an attacker to leak internal kernel information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: data races around icsk-\u003eicsk_af_ops in do_ipv6_setsockopt",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3566"
        },
        {
          "category": "external",
          "summary": "RHBZ#2143893",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143893"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3566",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3566"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3566",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3566"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57"
        }
      ],
      "release_date": "2022-10-06T06:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: data races around icsk-\u003eicsk_af_ops in do_ipv6_setsockopt"
    },
    {
      "cve": "CVE-2022-3567",
      "cwe": {
        "id": "CWE-421",
        "name": "Race Condition During Access to Alternate Channel"
      },
      "discovery_date": "2022-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2143943"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A data race problem was found in sk-\u003esk_prot in the network subsystem in ipv6 in the Linux kernel. This issue occurs while some functions access critical data, leading to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: data races around sk-\u003esk_prot",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3567"
        },
        {
          "category": "external",
          "summary": "RHBZ#2143943",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143943"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3567",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3567"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3567",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3567"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6"
        }
      ],
      "release_date": "2022-10-06T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: data races around sk-\u003esk_prot"
    },
    {
      "cve": "CVE-2022-3619",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2022-12-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2154235"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak flaw was found in the Linux kernel\u2019s L2CAP bluetooth functionality. This issue occurs when a user generates malicious packets, triggering the l2cap_recv_acldata function. This flaw allows a local or bluetooth connection user to potentially crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3619"
        },
        {
          "category": "external",
          "summary": "RHBZ#2154235",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154235"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3619",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3619"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3619",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3619"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=97097c85c088e11651146da32a4e1cdb9dfa6193",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=97097c85c088e11651146da32a4e1cdb9dfa6193"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?id.211918",
          "url": "https://vuldb.com/?id.211918"
        }
      ],
      "release_date": "2022-10-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the customer portal at https://access.redhat.com/solutions/268293.\n\nAlternatively, bluetooth can be disabled within the hardware or at the BIOS level, which will also provide effective mitigation as the kernel will not detect Bluetooth hardware on the system.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c"
    },
    {
      "cve": "CVE-2022-3623",
      "cwe": {
        "id": "CWE-123",
        "name": "Write-what-where Condition"
      },
      "discovery_date": "2023-01-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2165721"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in follow_page_pte in mm/gup.c in the Linux Kernel. This issue occurs due to a race problem which can poison the page table entry and cause a denial-of-service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3623"
        },
        {
          "category": "external",
          "summary": "RHBZ#2165721",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165721"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3623",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3623"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3623",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3623"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=fac35ba763ed07ba93154c95ffc0c4a55023707f",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=fac35ba763ed07ba93154c95ffc0c4a55023707f"
        }
      ],
      "release_date": "2022-09-01T06:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry"
    },
    {
      "cve": "CVE-2022-3625",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-11-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2144720"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Netlink device interface implementation in the Linux kernel that improperly handled certain error conditions, leading to a use-after-free issue with some network device drivers. A local attacker with admin access to the network device could use this to cause a denial of service (system crash) or execute arbitrary code.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free after failed devlink reload in devlink_param_get",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3625"
        },
        {
          "category": "external",
          "summary": "RHBZ#2144720",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2144720"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3625",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3625"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3625",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3625"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=6b4db2e528f650c7fb712961aac36455468d5902",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=6b4db2e528f650c7fb712961aac36455468d5902"
        }
      ],
      "release_date": "2022-08-09T08:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free after failed devlink reload in devlink_param_get"
    },
    {
      "cve": "CVE-2022-3628",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "discovery_date": "2022-12-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2150960"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: USB-accessible buffer overflow in brcmfmac",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3628"
        },
        {
          "category": "external",
          "summary": "RHBZ#2150960",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150960"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3628",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3628",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3628"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295"
        },
        {
          "category": "external",
          "summary": "https://seclists.org/oss-sec/2022/q4/60",
          "url": "https://seclists.org/oss-sec/2022/q4/60"
        }
      ],
      "release_date": "2022-10-22T09:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent the brcmfmac module from being loaded. See https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: USB-accessible buffer overflow in brcmfmac"
    },
    {
      "cve": "CVE-2022-3640",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-11-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2139610"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in the Linux Kernel in the l2cap_conn_del in net/bluetooth/l2cap_core.c function in the Bluetooth component. This issue leads to a use-after-free problem.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3640"
        },
        {
          "category": "external",
          "summary": "RHBZ#2139610",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139610"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3640",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3640",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3640"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=42cf46dea905a80f6de218e837ba4d4cc33d6979",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=42cf46dea905a80f6de218e837ba4d4cc33d6979"
        }
      ],
      "release_date": "2022-10-17T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c"
    },
    {
      "cve": "CVE-2022-3707",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "discovery_date": "2022-10-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2137979"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3707"
        },
        {
          "category": "external",
          "summary": "RHBZ#2137979",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137979"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3707",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3707"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3707",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3707"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz@163.com/",
          "url": "https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz@163.com/"
        }
      ],
      "release_date": "2022-10-07T08:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed"
    },
    {
      "cve": "CVE-2022-4128",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-08-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2134380"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference issue was discovered in the Linux kernel. This issue occurs in the MPTCP protocol when traversing the subflow list at disconnect time. A local user could potentially crash the system, causing a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: mptcp: NULL pointer dereference in subflow traversal at disconnect time",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-4128"
        },
        {
          "category": "external",
          "summary": "RHBZ#2134380",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134380"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-4128",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-4128"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4128",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4128"
        }
      ],
      "release_date": "2022-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: mptcp: NULL pointer dereference in subflow traversal at disconnect time"
    },
    {
      "cve": "CVE-2022-4129",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-08-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2134528"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-4129"
        },
        {
          "category": "external",
          "summary": "RHBZ#2134528",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134528"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-4129",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-4129"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4129",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4129"
        }
      ],
      "release_date": "2022-08-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference"
    },
    {
      "cve": "CVE-2022-4662",
      "cwe": {
        "id": "CWE-455",
        "name": "Non-exit on Failed Initialization"
      },
      "discovery_date": "2022-12-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2155788"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An incorrect access control flaw was found in the Linux kernel USB core subsystem. When attaching a malicious usb device, the recursive locking violation in usb-storage can cause the kernel to deadlock. This issue could allow a local user to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Recursive locking violation in usb-storage that can cause the kernel to deadlock",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-4662"
        },
        {
          "category": "external",
          "summary": "RHBZ#2155788",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155788"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-4662",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-4662"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4662",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4662"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/all/20220913140355.910732567@linuxfoundation.org/",
          "url": "https://lore.kernel.org/all/20220913140355.910732567@linuxfoundation.org/"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/all/CAB7eexLLApHJwZfMQ=X-PtRhw0BgO+5KcSMS05FNUYejJXqtSA@mail.gmail.com/",
          "url": "https://lore.kernel.org/all/CAB7eexLLApHJwZfMQ=X-PtRhw0BgO+5KcSMS05FNUYejJXqtSA@mail.gmail.com/"
        }
      ],
      "release_date": "2022-09-13T09:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: Recursive locking violation in usb-storage that can cause the kernel to deadlock"
    },
    {
      "cve": "CVE-2022-20141",
      "cwe": {
        "id": "CWE-667",
        "name": "Improper Locking"
      },
      "discovery_date": "2022-08-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2114937"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s IGMP protocol in how a user triggers a race condition in the ip_check_mc_rcu function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-20141"
        },
        {
          "category": "external",
          "summary": "RHBZ#2114937",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114937"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-20141",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-20141"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-20141",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20141"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/igmp.c?h=v5.19\u0026id=23d2b94043ca8835bd1e67749020e839f396a1c2",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/igmp.c?h=v5.19\u0026id=23d2b94043ca8835bd1e67749020e839f396a1c2"
        }
      ],
      "release_date": "2021-07-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets"
    },
    {
      "cve": "CVE-2022-21505",
      "cwe": {
        "id": "CWE-305",
        "name": "Authentication Bypass by Primary Weakness"
      },
      "discovery_date": "2022-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2106830"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An authentication bypass flaw was found in the Linux kernel\u2019s IMA policy when a user performs lockdown. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: lockdown bypass using IMA",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-21505"
        },
        {
          "category": "external",
          "summary": "RHBZ#2106830",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106830"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21505",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-21505"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21505",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21505"
        }
      ],
      "release_date": "2022-07-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: lockdown bypass using IMA"
    },
    {
      "cve": "CVE-2022-28388",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "discovery_date": "2022-04-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2073091"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A double-free flaw was found in the Linux kernel\u0027s USB2CAN interface implementation. This issue could allow a local user to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is Moderate because this case doesn\u0027t lead to a kernel crash as result of the pointers reference check preventing actual second memory free. The only known attack scenario is the possibility of a denial of service.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-28388"
        },
        {
          "category": "external",
          "summary": "RHBZ#2073091",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073091"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28388",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-28388"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28388",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28388"
        }
      ],
      "release_date": "2022-04-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent module usb_8dev from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c"
    },
    {
      "cve": "CVE-2022-33743",
      "cwe": {
        "id": "CWE-459",
        "name": "Incomplete Cleanup"
      },
      "discovery_date": "2022-07-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2107924"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An incomplete cleanup flaw was found in the Linux kernel\u2019s Xen networking XDP (eXpress Data Path) subsystem. This flaw allows a local user to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: network backend may cause Linux netfront to use freed SKBs (XSA-405)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Keeping this flaw Moderate, because only a denial of service is possible (A:H) as result of memory leak problem. The memory leak can happen because instead of removing skb, keeping it in the networking stack forever. The CVSS score is higher, than usually for Moderate, because kept \"C:H\" and \"I:H\" too in case maybe potentially would be possible privilege escalation too.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-33743"
        },
        {
          "category": "external",
          "summary": "RHBZ#2107924",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107924"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-33743",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-33743"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-33743",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-33743"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/drivers/net/xen-netfront.c?h=v5.19-rc7\u0026id=f63c2c2032c2e3caad9add3b82cc6e91c376fd26",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/drivers/net/xen-netfront.c?h=v5.19-rc7\u0026id=f63c2c2032c2e3caad9add3b82cc6e91c376fd26"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2022/07/05/5",
          "url": "https://www.openwall.com/lists/oss-security/2022/07/05/5"
        }
      ],
      "release_date": "2022-07-04T09:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: network backend may cause Linux netfront to use freed SKBs (XSA-405)"
    },
    {
      "cve": "CVE-2022-36280",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2022-09-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2133450"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds memory write vulnerability was found in the Linux kernel\u0027s vmwgfx driver in vmw_kms_cursor_snoop due to a missing check of a memcpy length. This flaw allows a local, unprivileged attacker with access to either the /dev/dri/card0 or /dev/dri/rendererD128 and able to issue an ioctl() on the resulting file descriptor, to crash the system, causing a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: vmwgfx: out-of-bounds write in vmw_kms_cursor_snoop",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Systems making use of the vmwgfx driver are potentially affected by this flaw; systems without the vmwgfx driver loaded are not affected by this flaw.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-36280"
        },
        {
          "category": "external",
          "summary": "RHBZ#2133450",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133450"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-36280",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-36280"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-36280",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36280"
        }
      ],
      "release_date": "2022-09-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, it is possible to prevent the affected code from being loaded by blacklisting the vmwgfx kernel module. For instructions relating to blacklisting a kernel module, please see https://access.redhat.com/solutions/41278.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: vmwgfx: out-of-bounds write in vmw_kms_cursor_snoop"
    },
    {
      "cve": "CVE-2022-36879",
      "cwe": {
        "id": "CWE-911",
        "name": "Improper Update of Reference Count"
      },
      "discovery_date": "2022-07-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2119855"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s IP framework for transforming packets (XFRM subsystem). An error while resolving policies in xfrm_bundle_lookup causes the refcount to drop twice, leading to a possible crash and a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-36879"
        },
        {
          "category": "external",
          "summary": "RHBZ#2119855",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119855"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-36879",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-36879",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36879"
        }
      ],
      "release_date": "2022-06-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice"
    },
    {
      "cve": "CVE-2022-39188",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-09-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2130141"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in include/asm-generic/tlb.h in the Linux kernel due to a race condition (unmap_mapping_range versus munmap). This issue allows a device driver to free a page while it still has stale TLB entries.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue only occurs in situations with VM_PFNMAP virtual memory areas (VMAs).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-39188"
        },
        {
          "category": "external",
          "summary": "RHBZ#2130141",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130141"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-39188",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-39188",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-39188"
        },
        {
          "category": "external",
          "summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2329",
          "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2329"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b67fbebd4cf980aecbcc750e1462128bffe8ae15",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b67fbebd4cf980aecbcc750e1462128bffe8ae15"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/stable/20220831191348.3388208-1-jannh@google.com/T/#u",
          "url": "https://lore.kernel.org/stable/20220831191348.3388208-1-jannh@google.com/T/#u"
        }
      ],
      "release_date": "2022-07-06T16:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry"
    },
    {
      "cve": "CVE-2022-39189",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-09-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2124788"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the x86 KVM subsystem in kvm_steal_time_set_preempted in arch/x86/kvm/x86.c in the Linux kernel. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "With the current usecase, attacker need a root privileges to exploit this flaw, however there may have ways to defeat this either, but in both cases it seems that Attack Complexity is high (AC:H)",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-39189"
        },
        {
          "category": "external",
          "summary": "RHBZ#2124788",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124788"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-39189",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-39189"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-39189",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-39189"
        },
        {
          "category": "external",
          "summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2309",
          "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2309"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cd88243c7e03845a450795e134b488fc2afb736",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cd88243c7e03845a450795e134b488fc2afb736"
        }
      ],
      "release_date": "2022-05-30T03:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning"
    },
    {
      "cve": "CVE-2022-41674",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "discovery_date": "2022-10-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2134377"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer overflow flaw was found in the u8 overflow in cfg80211_update_notlisted_nontrans() in net/wireless/scan.c in the Linux kernel\u2019s wifi subcomponent. This flaw allows an attacker to crash the system or leak internal kernel information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: u8 overflow problem in cfg80211_update_notlisted_nontrans()",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-41674"
        },
        {
          "category": "external",
          "summary": "RHBZ#2134377",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134377"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41674",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-41674"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41674",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41674"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2022/10/13/2",
          "url": "https://www.openwall.com/lists/oss-security/2022/10/13/2"
        }
      ],
      "release_date": "2022-10-13T10:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: u8 overflow problem in cfg80211_update_notlisted_nontrans()"
    },
    {
      "cve": "CVE-2022-42703",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-10-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2133483"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak flaw with use-after-free capability was found in the Linux kernel. The VMA mm/rmap.c functionality in the is_mergeable_anon_vma() function continuously forks, using memory operations to trigger an incorrect reuse of leaf anon_vma. This issue allows a local attacker to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free related to leaf anon_vma double reuse",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-42703"
        },
        {
          "category": "external",
          "summary": "RHBZ#2133483",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133483"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42703",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42703",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42703"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2555283eb40df89945557273121e9393ef9b542b",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2555283eb40df89945557273121e9393ef9b542b"
        }
      ],
      "release_date": "2022-10-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free related to leaf anon_vma double reuse"
    },
    {
      "cve": "CVE-2022-42720",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-10-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2134451"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in bss_ref_get in the net/wireless/scan.c in\u00a0the Linux kernel. This issue can lead to a denial of service or arbitrary code execution.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in bss_ref_get in net/wireless/scan.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-42720"
        },
        {
          "category": "external",
          "summary": "RHBZ#2134451",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134451"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42720",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-42720"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42720",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42720"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2022/10/13/2",
          "url": "https://www.openwall.com/lists/oss-security/2022/10/13/2"
        }
      ],
      "release_date": "2022-10-13T10:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria, comprised of ease of use and deployment, applicability to widespread installation base, and stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in bss_ref_get in net/wireless/scan.c"
    },
    {
      "cve": "CVE-2022-42721",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2022-10-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2134506"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A list corruption flaw was found in cfg80211_add_nontrans_list in the net/wireless/scan.c function in the Linux kernel. This flaw could lead to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-42721"
        },
        {
          "category": "external",
          "summary": "RHBZ#2134506",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134506"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42721",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-42721"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42721",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42721"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2022/10/13/2",
          "url": "https://www.openwall.com/lists/oss-security/2022/10/13/2"
        }
      ],
      "release_date": "2022-10-13T10:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c"
    },
    {
      "cve": "CVE-2022-42722",
      "cwe": {
        "id": "CWE-705",
        "name": "Incorrect Control Flow Scoping"
      },
      "discovery_date": "2022-10-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2134517"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in P2P-Device in wifi in ieee80211_rx_h_decrypt in net/mac80211/rx.c in the Linux kernel, leading to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Denial of service in beacon protection for P2P-device",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-42722"
        },
        {
          "category": "external",
          "summary": "RHBZ#2134517",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134517"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42722",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-42722"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42722",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42722"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2022/10/13/2",
          "url": "https://www.openwall.com/lists/oss-security/2022/10/13/2"
        }
      ],
      "release_date": "2022-10-13T10:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent module mac80211 from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Denial of service in beacon protection for P2P-device"
    },
    {
      "cve": "CVE-2022-42896",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-11-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2147364"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u0027s implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_connect and l2cap_le_connect_req functions. An attacker with physical access within the range of standard Bluetooth transmission could execute code leaking kernel memory via Bluetooth if within proximity of the victim.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-42896"
        },
        {
          "category": "external",
          "summary": "RHBZ#2147364",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147364"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42896",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42896",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42896"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-pf87-6c9q-jvm4",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-pf87-6c9q-jvm4"
        }
      ],
      "release_date": "2022-11-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "This flaw can be mitigated by disabling Bluetooth on the operating system level. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. For instructions on how to disable Bluetooth on RHEL please refer to https://access.redhat.com/solutions/2682931.\n\nAlternatively Bluetooth can be disabled within the hardware or at BIOS level which will also provide an effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c"
    },
    {
      "cve": "CVE-2022-43750",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2022-10-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2151270"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds memory write flaw in the Linux kernel\u2019s USB Monitor component was found in how a user with access to the /dev/usbmon can trigger it by an incorrect write to the memory of the usbmon. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory corruption in usbmon driver",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-43750"
        },
        {
          "category": "external",
          "summary": "RHBZ#2151270",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151270"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-43750",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43750",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43750"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/a659daf63d16aa883be42f3f34ff84235c302198",
          "url": "https://github.com/torvalds/linux/commit/a659daf63d16aa883be42f3f34ff84235c302198"
        }
      ],
      "release_date": "2022-09-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: memory corruption in usbmon driver"
    },
    {
      "cve": "CVE-2022-47929",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2023-01-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2168246"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux kernel. This issue may allow a local unprivileged user to trigger a denial of service if the alloc_workqueue function return is not validated in time of failure, resulting in a system crash or leaked internal kernel information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: NULL pointer dereference in traffic control subsystem",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-47929"
        },
        {
          "category": "external",
          "summary": "RHBZ#2168246",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168246"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-47929",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-47929",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-47929"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407"
        }
      ],
      "release_date": "2023-01-09T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "The mitigation is to disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n```\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n```",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: NULL pointer dereference in traffic control subsystem"
    },
    {
      "cve": "CVE-2022-48695",
      "discovery_date": "2024-05-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2278999"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A user after-free vulnerability was found in the Linux kernel in the refcount_t variable when performing the controller reset. This issue could lead to denial of service of the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: scsi: mpt3sas: Fix use-after-free warning",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-48695"
        },
        {
          "category": "external",
          "summary": "RHBZ#2278999",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278999"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-48695",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-48695"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48695",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48695"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2024050348-CVE-2022-48695-8a9e@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2024050348-CVE-2022-48695-8a9e@gregkh/T"
        }
      ],
      "release_date": "2024-05-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: scsi: mpt3sas: Fix use-after-free warning"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Kyle Zeng"
          ]
        }
      ],
      "cve": "CVE-2023-0394",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2023-01-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2162120"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: NULL pointer dereference in rawv6_push_pending_frames",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-0394"
        },
        {
          "category": "external",
          "summary": "RHBZ#2162120",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162120"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0394",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0394",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0394"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2023/01/18/2",
          "url": "https://www.openwall.com/lists/oss-security/2023/01/18/2"
        }
      ],
      "release_date": "2023-01-17T17:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: NULL pointer dereference in rawv6_push_pending_frames"
    },
    {
      "cve": "CVE-2023-0461",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2023-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2176192"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: net/ulp: use-after-free in listening ULP sockets",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Versions of Red Hat Enterprise Linux before 8 are not affected by this vulnerability as they did not include the upstream commit 734942c (\"tcp: ULP infrastructure\").",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-0461"
        },
        {
          "category": "external",
          "summary": "RHBZ#2176192",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176192"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0461",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-0461"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c",
          "url": "https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c"
        }
      ],
      "release_date": "2023-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent module tls from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: net/ulp: use-after-free in listening ULP sockets"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Jann Horn"
          ],
          "organization": "Google Project Zero"
        }
      ],
      "cve": "CVE-2023-0590",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2023-01-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2165741"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 (\"net: sched: fix race condition in qdisc_graft()\") not applied yet, then kernel could be affected.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free due to race condition in qdisc_graft()",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-0590"
        },
        {
          "category": "external",
          "summary": "RHBZ#2165741",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165741"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0590",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-0590"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0590",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0590"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/all/20221018203258.2793282-1-edumazet@google.com/",
          "url": "https://lore.kernel.org/all/20221018203258.2793282-1-edumazet@google.com/"
        }
      ],
      "release_date": "2022-10-18T06:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free due to race condition in qdisc_graft()"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Pumpkin (@u1f383)"
          ],
          "organization": "DEVCORE Internship Program, and NYCU Software Security LAB"
        }
      ],
      "cve": "CVE-2023-1195",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-12-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2154171"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in reconn_set_ipaddr_from_hostname in fs/cifs/connect.c in the Linux kernel. The issue occurs when it forgets to set the free pointer server-\u003ehostname to NULL, leading to an invalid pointer request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-1195"
        },
        {
          "category": "external",
          "summary": "RHBZ#2154171",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154171"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1195",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-1195"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1195",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1195"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621",
          "url": "https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621"
        }
      ],
      "release_date": "2022-10-02T06:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Wei Chen"
          ]
        }
      ],
      "cve": "CVE-2023-1382",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2023-03-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2177371"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A data race flaw was found in the Linux kernel, between where con is allocated and con-\u003esock is set. This issue leads to a NULL pointer dereference when accessing con-\u003esock-\u003esk in net/tipc/topsrv.c in the tipc protocol in the Linux kernel.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: denial of service in tipc_conn_close",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-1382"
        },
        {
          "category": "external",
          "summary": "RHBZ#2177371",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177371"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1382",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-1382"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1382",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1382"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin@gmail.com/T/#u",
          "url": "https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin@gmail.com/T/#u"
        }
      ],
      "release_date": "2022-11-18T06:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "This flaw can be mitigated by preventing the affected transparent inter-process communication (TIPC) protocol kernel module from loading during the boot time. Ensure the module is added into the blacklist file.\n~~~\nRefer:  \nHow do I blacklist a kernel module to prevent it from loading automatically? \nhttps://access.redhat.com/solutions/41278\n~~~",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: denial of service in tipc_conn_close"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Wei Chen"
          ]
        }
      ],
      "cve": "CVE-2023-2177",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2023-04-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2187953"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference issue was found in the SCTP network protocol in net/sctp/stream_sched.c in the Linux kernel. If stream_in allocation fails, stream_out is freed, which would be accessed further. This flaw allows a local user to crash the system or potentially cause a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-2177"
        },
        {
          "category": "external",
          "summary": "RHBZ#2187953",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187953"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-2177",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-2177"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-2177",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2177"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=181d8d2066c0",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=181d8d2066c0"
        }
      ],
      "release_date": "2022-07-25T12:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common"
    },
    {
      "cve": "CVE-2023-2513",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2023-05-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2193097"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the Linux kernel\u0027s ext4 filesystem in the way it handled the extra inode size for extended attributes. This flaw allows a privileged local user to cause a system crash or other undefined behaviors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: ext4: use-after-free in ext4_xattr_set_entry()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw has been rated as having Moderate impact because of the preconditions needed to trigger the issue. The vulnerability can be exploited by a regular user, but the filesystem should be mounted with `debug_want_extra_isize`=128 and the user must have write access to the filesystem. It\u0027s also important to emphasize that `debug_want_extra_isize` is a debug mount option and should never be used in production.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-2513"
        },
        {
          "category": "external",
          "summary": "RHBZ#2193097",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2193097"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-2513",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-2513"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-2513",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2513"
        }
      ],
      "release_date": "2022-06-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: ext4: use-after-free in ext4_xattr_set_entry()"
    },
    {
      "cve": "CVE-2023-22998",
      "cwe": {
        "id": "CWE-436",
        "name": "Interpretation Conflict"
      },
      "discovery_date": "2023-03-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2182429"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel before 6.0.3, drivers/gpu/drm/virtio/virtgpu_object.c misinterprets the drm_gem_shmem_get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: drm/virtio: improper return value check in virtio_gpu_object_shmem_init()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Enterprise Linux 6 and 7 are not affected by this flaw as they did not include the `virtio_gpu_object_shmem_init` function, introduced upstream in commit 2f2aa13 (\"drm/virtio: move virtio_gpu_mem_entry initialization to new function\").",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-22998"
        },
        {
          "category": "external",
          "summary": "RHBZ#2182429",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182429"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-22998",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-22998"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-22998",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-22998"
        }
      ],
      "release_date": "2023-02-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: drm/virtio: improper return value check in virtio_gpu_object_shmem_init()"
    },
    {
      "cve": "CVE-2023-52340",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-01-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2257979"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw in the routing table size was found in the ICMPv6 handling of \"Packet Too Big\". The size of the routing table is regulated by periodic garbage collection. However, with \"Packet Too Big Messages\" it is possible to exceed the routing table size and garbage collector threshold. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: ICMPv6 \u201cPacket Too Big\u201d packets force a DoS of the Linux kernel by forcing 100% CPU",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-52340"
        },
        {
          "category": "external",
          "summary": "RHBZ#2257979",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257979"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-52340",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-52340"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52340",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52340"
        },
        {
          "category": "external",
          "summary": "https://alas.aws.amazon.com/cve/html/CVE-2023-52340.html",
          "url": "https://alas.aws.amazon.com/cve/html/CVE-2023-52340.html"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=af6d10345ca76670c1b7c37799f0d5576ccef277",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=af6d10345ca76670c1b7c37799f0d5576ccef277"
        }
      ],
      "release_date": "2024-01-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: ICMPv6 \u201cPacket Too Big\u201d packets force a DoS of the Linux kernel by forcing 100% CPU"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.