rhsa-2023_2736
Vulnerability from csaf_redhat
Published
2023-05-16 08:43
Modified
2024-11-06 02:57
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update

Notes

Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564) * net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461) * hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch (CVE-2021-26341) * malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory (CVE-2021-33655) * when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds (CVE-2021-33656) * possible race condition in drivers/tty/tty_buffers.c (CVE-2022-1462) * use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges (CVE-2022-1679) * KVM: NULL pointer dereference in kvm_mmu_invpcid_gva (CVE-2022-1789) * KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks (CVE-2022-2196) * netfilter: nf_conntrack_irc message handling issue (CVE-2022-2663) * race condition in xfrm_probe_algs can lead to OOB read/write (CVE-2022-3028) * media: em28xx: initialize refcount before kref_get (CVE-2022-3239) * race condition in hugetlb_no_page() in mm/hugetlb.c (CVE-2022-3522) * memory leak in ipv6_renew_options() (CVE-2022-3524) * data races around icsk->icsk_af_ops in do_ipv6_setsockopt (CVE-2022-3566) * data races around sk->sk_prot (CVE-2022-3567) * memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c (CVE-2022-3619) * denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry (CVE-2022-3623) * use-after-free after failed devlink reload in devlink_param_get (CVE-2022-3625) * USB-accessible buffer overflow in brcmfmac (CVE-2022-3628) * Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed (CVE-2022-3707) * l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference (CVE-2022-4129) * igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets (CVE-2022-20141) * Executable Space Protection Bypass (CVE-2022-25265) * Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594) * unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry (CVE-2022-39188) * TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning (CVE-2022-39189) * Report vmalloc UAF in dvb-core/dmxdev (CVE-2022-41218) * u8 overflow problem in cfg80211_update_notlisted_nontrans() (CVE-2022-41674) * use-after-free related to leaf anon_vma double reuse (CVE-2022-42703) * use-after-free in bss_ref_get in net/wireless/scan.c (CVE-2022-42720) * BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c (CVE-2022-42721) * Denial of service in beacon protection for P2P-device (CVE-2022-42722) * memory corruption in usbmon driver (CVE-2022-43750) * NULL pointer dereference in traffic control subsystem (CVE-2022-47929) * NULL pointer dereference in rawv6_push_pending_frames (CVE-2023-0394) * use-after-free caused by invalid pointer hostname in fs/cifs/connect.c (CVE-2023-1195) * Soft lockup occurred during __page_mapcount (CVE-2023-1582) * slab-out-of-bounds read vulnerabilities in cbq_classify (CVE-2023-23454) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.8 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564)\n\n* net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)\n\n* hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch (CVE-2021-26341)\n\n* malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory (CVE-2021-33655)\n\n* when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds (CVE-2021-33656)\n\n* possible race condition in drivers/tty/tty_buffers.c (CVE-2022-1462)\n\n* use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges (CVE-2022-1679)\n\n* KVM: NULL pointer dereference in kvm_mmu_invpcid_gva (CVE-2022-1789)\n\n* KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks (CVE-2022-2196)\n\n* netfilter: nf_conntrack_irc message handling issue (CVE-2022-2663)\n\n* race condition in xfrm_probe_algs can lead to OOB read/write (CVE-2022-3028)\n\n* media: em28xx: initialize refcount before kref_get (CVE-2022-3239)\n\n* race condition in hugetlb_no_page() in mm/hugetlb.c (CVE-2022-3522)\n\n* memory leak in ipv6_renew_options() (CVE-2022-3524)\n\n* data races around icsk-\u003eicsk_af_ops in do_ipv6_setsockopt (CVE-2022-3566)\n\n* data races around sk-\u003esk_prot (CVE-2022-3567)\n\n* memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c (CVE-2022-3619)\n\n* denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry (CVE-2022-3623)\n\n* use-after-free after failed devlink reload in devlink_param_get (CVE-2022-3625)\n\n* USB-accessible buffer overflow in brcmfmac (CVE-2022-3628)\n\n* Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed (CVE-2022-3707)\n\n* l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference (CVE-2022-4129)\n\n* igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets (CVE-2022-20141)\n\n* Executable Space Protection Bypass (CVE-2022-25265)\n\n* Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594)\n\n* unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry (CVE-2022-39188)\n\n* TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning (CVE-2022-39189)\n\n* Report vmalloc UAF in dvb-core/dmxdev (CVE-2022-41218)\n\n* u8 overflow problem in cfg80211_update_notlisted_nontrans() (CVE-2022-41674)\n\n* use-after-free related to leaf anon_vma double reuse (CVE-2022-42703)\n\n* use-after-free in bss_ref_get in net/wireless/scan.c (CVE-2022-42720)\n\n* BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c (CVE-2022-42721)\n\n* Denial of service in beacon protection for P2P-device (CVE-2022-42722)\n\n* memory corruption in usbmon driver (CVE-2022-43750)\n\n* NULL pointer dereference in traffic control subsystem (CVE-2022-47929)\n\n* NULL pointer dereference in rawv6_push_pending_frames (CVE-2023-0394)\n\n* use-after-free caused by invalid pointer hostname in fs/cifs/connect.c (CVE-2023-1195)\n\n* Soft lockup occurred during __page_mapcount (CVE-2023-1582)\n\n* slab-out-of-bounds read vulnerabilities in cbq_classify (CVE-2023-23454)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.8 Release Notes linked from the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2023:2736",
        "url": "https://access.redhat.com/errata/RHSA-2023:2736"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.8_release_notes/index",
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.8_release_notes/index"
      },
      {
        "category": "external",
        "summary": "2055499",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2055499"
      },
      {
        "category": "external",
        "summary": "2061703",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061703"
      },
      {
        "category": "external",
        "summary": "2078466",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078466"
      },
      {
        "category": "external",
        "summary": "2084125",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084125"
      },
      {
        "category": "external",
        "summary": "2085300",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085300"
      },
      {
        "category": "external",
        "summary": "2090723",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090723"
      },
      {
        "category": "external",
        "summary": "2108691",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108691"
      },
      {
        "category": "external",
        "summary": "2108696",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108696"
      },
      {
        "category": "external",
        "summary": "2114937",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114937"
      },
      {
        "category": "external",
        "summary": "2122228",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122228"
      },
      {
        "category": "external",
        "summary": "2122960",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122960"
      },
      {
        "category": "external",
        "summary": "2123056",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123056"
      },
      {
        "category": "external",
        "summary": "2124788",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124788"
      },
      {
        "category": "external",
        "summary": "2127985",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127985"
      },
      {
        "category": "external",
        "summary": "2130141",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130141"
      },
      {
        "category": "external",
        "summary": "2133483",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133483"
      },
      {
        "category": "external",
        "summary": "2134377",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134377"
      },
      {
        "category": "external",
        "summary": "2134451",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134451"
      },
      {
        "category": "external",
        "summary": "2134506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134506"
      },
      {
        "category": "external",
        "summary": "2134517",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134517"
      },
      {
        "category": "external",
        "summary": "2134528",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134528"
      },
      {
        "category": "external",
        "summary": "2137979",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137979"
      },
      {
        "category": "external",
        "summary": "2143893",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143893"
      },
      {
        "category": "external",
        "summary": "2143943",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143943"
      },
      {
        "category": "external",
        "summary": "2144720",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2144720"
      },
      {
        "category": "external",
        "summary": "2150947",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150947"
      },
      {
        "category": "external",
        "summary": "2150960",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150960"
      },
      {
        "category": "external",
        "summary": "2150979",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150979"
      },
      {
        "category": "external",
        "summary": "2150999",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150999"
      },
      {
        "category": "external",
        "summary": "2151270",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151270"
      },
      {
        "category": "external",
        "summary": "2154171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154171"
      },
      {
        "category": "external",
        "summary": "2154235",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154235"
      },
      {
        "category": "external",
        "summary": "2160023",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160023"
      },
      {
        "category": "external",
        "summary": "2162120",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162120"
      },
      {
        "category": "external",
        "summary": "2165721",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165721"
      },
      {
        "category": "external",
        "summary": "2168246",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168246"
      },
      {
        "category": "external",
        "summary": "2168297",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168297"
      },
      {
        "category": "external",
        "summary": "2176192",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176192"
      },
      {
        "category": "external",
        "summary": "2180936",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180936"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2736.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
    "tracking": {
      "current_release_date": "2024-11-06T02:57:24+00:00",
      "generator": {
        "date": "2024-11-06T02:57:24+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.1.1"
        }
      },
      "id": "RHSA-2023:2736",
      "initial_release_date": "2023-05-16T08:43:55+00:00",
      "revision_history": [
        {
          "date": "2023-05-16T08:43:55+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2023-05-16T08:43:55+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-06T02:57:24+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux NFV (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux NFV (v. 8)",
                  "product_id": "NFV-8.8.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux RT (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux RT (v. 8)",
                  "product_id": "RT-8.8.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
                "product": {
                  "name": "kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
                  "product_id": "kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-477.10.1.rt7.274.el8_8?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                "product": {
                  "name": "kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                  "product_id": "kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-477.10.1.rt7.274.el8_8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                "product": {
                  "name": "kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                  "product_id": "kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-477.10.1.rt7.274.el8_8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                  "product_id": "kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-477.10.1.rt7.274.el8_8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                  "product_id": "kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-477.10.1.rt7.274.el8_8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-477.10.1.rt7.274.el8_8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                  "product_id": "kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-477.10.1.rt7.274.el8_8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                  "product_id": "kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-477.10.1.rt7.274.el8_8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                  "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-477.10.1.rt7.274.el8_8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                  "product_id": "kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-477.10.1.rt7.274.el8_8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                "product": {
                  "name": "kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                  "product_id": "kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-477.10.1.rt7.274.el8_8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                "product": {
                  "name": "kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                  "product_id": "kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-477.10.1.rt7.274.el8_8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                "product": {
                  "name": "kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                  "product_id": "kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-477.10.1.rt7.274.el8_8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-477.10.1.rt7.274.el8_8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-477.10.1.rt7.274.el8_8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-477.10.1.rt7.274.el8_8?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src as a component of Red Hat Enterprise Linux NFV (v. 8)",
          "product_id": "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src"
        },
        "product_reference": "kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
        "relates_to_product_reference": "NFV-8.8.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
          "product_id": "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        },
        "product_reference": "kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
        "relates_to_product_reference": "NFV-8.8.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
          "product_id": "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        },
        "product_reference": "kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
        "relates_to_product_reference": "NFV-8.8.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
          "product_id": "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
        "relates_to_product_reference": "NFV-8.8.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
          "product_id": "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        },
        "product_reference": "kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
        "relates_to_product_reference": "NFV-8.8.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
          "product_id": "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
        "relates_to_product_reference": "NFV-8.8.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
          "product_id": "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
        "relates_to_product_reference": "NFV-8.8.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
          "product_id": "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
        "relates_to_product_reference": "NFV-8.8.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
          "product_id": "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
        "relates_to_product_reference": "NFV-8.8.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
          "product_id": "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
        "relates_to_product_reference": "NFV-8.8.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
          "product_id": "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
        "relates_to_product_reference": "NFV-8.8.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
          "product_id": "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
        "relates_to_product_reference": "NFV-8.8.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
          "product_id": "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
        "relates_to_product_reference": "NFV-8.8.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
          "product_id": "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
        "relates_to_product_reference": "NFV-8.8.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
          "product_id": "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        },
        "product_reference": "kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
        "relates_to_product_reference": "NFV-8.8.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
          "product_id": "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        },
        "product_reference": "kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
        "relates_to_product_reference": "NFV-8.8.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src as a component of Red Hat Enterprise Linux RT (v. 8)",
          "product_id": "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src"
        },
        "product_reference": "kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
        "relates_to_product_reference": "RT-8.8.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
          "product_id": "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        },
        "product_reference": "kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
        "relates_to_product_reference": "RT-8.8.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
          "product_id": "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        },
        "product_reference": "kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
        "relates_to_product_reference": "RT-8.8.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
          "product_id": "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
        "relates_to_product_reference": "RT-8.8.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
          "product_id": "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        },
        "product_reference": "kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
        "relates_to_product_reference": "RT-8.8.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
          "product_id": "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
        "relates_to_product_reference": "RT-8.8.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
          "product_id": "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
        "relates_to_product_reference": "RT-8.8.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
          "product_id": "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
        "relates_to_product_reference": "RT-8.8.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
          "product_id": "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
        "relates_to_product_reference": "RT-8.8.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
          "product_id": "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
        "relates_to_product_reference": "RT-8.8.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
          "product_id": "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
        "relates_to_product_reference": "RT-8.8.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
          "product_id": "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
        "relates_to_product_reference": "RT-8.8.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
          "product_id": "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
        "relates_to_product_reference": "RT-8.8.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
          "product_id": "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
        "relates_to_product_reference": "RT-8.8.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
          "product_id": "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        },
        "product_reference": "kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
        "relates_to_product_reference": "RT-8.8.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
          "product_id": "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        },
        "product_reference": "kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
        "relates_to_product_reference": "RT-8.8.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "AMD"
          ]
        }
      ],
      "cve": "CVE-2021-26341",
      "cwe": {
        "id": "CWE-552",
        "name": "Files or Directories Accessible to External Parties"
      },
      "discovery_date": "2022-03-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2061703"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in hw. This issue can cause AMD CPUs to transiently execute beyond unconditional direct branches.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-26341"
        },
        {
          "category": "external",
          "summary": "RHBZ#2061703",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061703"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-26341",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-26341"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26341",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26341"
        },
        {
          "category": "external",
          "summary": "https://grsecurity.net/amd_branch_mispredictor_part_2_where_no_cpu_has_gone_before",
          "url": "https://grsecurity.net/amd_branch_mispredictor_part_2_where_no_cpu_has_gone_before"
        },
        {
          "category": "external",
          "summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1026",
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1026"
        },
        {
          "category": "external",
          "summary": "https://www.amd.com/system/files/documents/software-techniques-for-managing-speculation.pdf",
          "url": "https://www.amd.com/system/files/documents/software-techniques-for-managing-speculation.pdf"
        }
      ],
      "release_date": "2022-03-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch"
    },
    {
      "cve": "CVE-2021-33655",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2022-07-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2108691"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the Linux kernel\u2019s framebuffer-based console driver functionality in the way a user triggers ioctl FBIOPUT_VSCREENINFO with malicious data. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-33655"
        },
        {
          "category": "external",
          "summary": "RHBZ#2108691",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108691"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33655",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-33655"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33655",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33655"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4"
        }
      ],
      "release_date": "2022-07-08T09:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory"
    },
    {
      "cve": "CVE-2021-33656",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2022-07-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2108696"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the Linux kernel\u2019s console driver functionality in the way a user triggers the ioctl PIO_FONT with malicious data. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is rated as a having Moderate impact, because only local user with the access to the VGA device can trigger it.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-33656"
        },
        {
          "category": "external",
          "summary": "RHBZ#2108696",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108696"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33656",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-33656"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33656",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33656"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/releases/5.10.127/vt-drop-old-font-ioctls.patch",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/releases/5.10.127/vt-drop-old-font-ioctls.patch"
        }
      ],
      "release_date": "2021-01-05T10:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds"
    },
    {
      "cve": "CVE-2021-47592",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2024-06-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2293235"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: stmmac: fix tc flower deletion for VLAN priority Rx steering\n\nTo replicate the issue:-\n\n1) Add 1 flower filter for VLAN Priority based frame steering:-\n$ IFDEVNAME=eth0\n$ tc qdisc add dev $IFDEVNAME ingress\n$ tc qdisc add dev $IFDEVNAME root mqprio num_tc 8 \\\n   map 0 1 2 3 4 5 6 7 0 0 0 0 0 0 0 0 \\\n   queues 1@0 1@1 1@2 1@3 1@4 1@5 1@6 1@7 hw 0\n$ tc filter add dev $IFDEVNAME parent ffff: protocol 802.1Q \\\n   flower vlan_prio 0 hw_tc 0\n\n2) Get the \u0027pref\u0027 id\n$ tc filter show dev $IFDEVNAME ingress\n\n3) Delete a specific tc flower record (say pref 49151)\n$ tc filter del dev $IFDEVNAME parent ffff: pref 49151\n\nFrom dmesg, we will observe kernel NULL pointer ooops\n\n[  197.170464] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[  197.171367] #PF: supervisor read access in kernel mode\n[  197.171367] #PF: error_code(0x0000) - not-present page\n[  197.171367] PGD 0 P4D 0\n[  197.171367] Oops: 0000 [#1] PREEMPT SMP NOPTI\n\n\u003csnip\u003e\n\n[  197.171367] RIP: 0010:tc_setup_cls+0x20b/0x4a0 [stmmac]\n\n\u003csnip\u003e\n\n[  197.171367] Call Trace:\n[  197.171367]  \u003cTASK\u003e\n[  197.171367]  ? __stmmac_disable_all_queues+0xa8/0xe0 [stmmac]\n[  197.171367]  stmmac_setup_tc_block_cb+0x70/0x110 [stmmac]\n[  197.171367]  tc_setup_cb_destroy+0xb3/0x180\n[  197.171367]  fl_hw_destroy_filter+0x94/0xc0 [cls_flower]\n\nThe above issue is due to previous incorrect implementation of\ntc_del_vlan_flow(), shown below, that uses flow_cls_offload_flow_rule()\nto get struct flow_rule *rule which is no longer valid for tc filter\ndelete operation.\n\n  struct flow_rule *rule = flow_cls_offload_flow_rule(cls);\n  struct flow_dissector *dissector = rule-\u003ematch.dissector;\n\nSo, to ensure tc_del_vlan_flow() deletes the right VLAN cls record for\nearlier configured RX queue (configured by hw_tc) in tc_add_vlan_flow(),\nthis patch introduces stmmac_rfs_entry as driver-side flow_cls_offload\nrecord for \u0027RX frame steering\u0027 tc flower, currently used for VLAN\npriority. The implementation has taken consideration for future extension\nto include other type RX frame steering such as EtherType based.\n\nv2:\n - Clean up overly extensive backtrace and rewrite git message to better\n   explain the kernel NULL pointer issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: net: stmmac: fix tc flower deletion for VLAN priority Rx steering",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-47592"
        },
        {
          "category": "external",
          "summary": "RHBZ#2293235",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293235"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-47592",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-47592"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47592",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47592"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47592-7ca6@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47592-7ca6@gregkh/T"
        }
      ],
      "release_date": "2024-06-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: net: stmmac: fix tc flower deletion for VLAN priority Rx steering"
    },
    {
      "cve": "CVE-2022-1462",
      "cwe": {
        "id": "CWE-366",
        "name": "Race Condition within a Thread"
      },
      "discovery_date": "2022-04-25T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2078466"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds read flaw was found in the Linux kernel\u2019s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: possible race condition in drivers/tty/tty_buffers.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1462"
        },
        {
          "category": "external",
          "summary": "RHBZ#2078466",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078466"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1462",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1462"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1462",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1462"
        },
        {
          "category": "external",
          "summary": "https://seclists.org/oss-sec/2022/q2/155",
          "url": "https://seclists.org/oss-sec/2022/q2/155"
        }
      ],
      "release_date": "2022-05-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: possible race condition in drivers/tty/tty_buffers.c"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "elijahbai"
          ],
          "organization": "Tencent Security Yunding Lab"
        }
      ],
      "cve": "CVE-2022-1679",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-05-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2084125"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Keeping this issue Moderate, because the impact is limited: likely only possibility of memory leak and crash, but not privileges escalation and both kind of race condition that is hard to trigger.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1679"
        },
        {
          "category": "external",
          "summary": "RHBZ#2084125",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084125"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1679",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1679"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1679",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1679"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/lkml/87ilqc7jv9.fsf@kernel.org/t/",
          "url": "https://lore.kernel.org/lkml/87ilqc7jv9.fsf@kernel.org/t/"
        }
      ],
      "release_date": "2022-02-07T10:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent the module ath9k from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Qiuhao Li"
          ],
          "organization": "Harbin Institute of Technology"
        },
        {
          "names": [
            "Yongkang Jia",
            "Gaoning Pan"
          ],
          "organization": "Zhejiang University"
        }
      ],
      "cve": "CVE-2022-1789",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-05-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2090723"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in KVM. With shadow paging enabled if INVPCID is executed with CR0.PG=0, the invlpg callback is not set, and the result is a NULL pointer dereference. This flaw allows a guest user to cause a kernel oops condition on the host, resulting in a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Enterprise Linux 6 and 7 did not provide support for INVPCID in shadow paging mode and therefore are not affected by this issue.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1789"
        },
        {
          "category": "external",
          "summary": "RHBZ#2090723",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090723"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1789",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1789"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1789",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1789"
        },
        {
          "category": "external",
          "summary": "https://github.com/advisories/GHSA-v8pq-23qj-q7x7",
          "url": "https://github.com/advisories/GHSA-v8pq-23qj-q7x7"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2022/05/25/2",
          "url": "https://www.openwall.com/lists/oss-security/2022/05/25/2"
        }
      ],
      "release_date": "2022-05-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva"
    },
    {
      "cve": "CVE-2022-2196",
      "cwe": {
        "id": "CWE-1188",
        "name": "Initialization of a Resource with an Insecure Default"
      },
      "discovery_date": "2023-01-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2160023"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the KVM\u0027s Intel nested virtualization feature (nVMX). Since L1 and L2 shared branch prediction modes (guest-user and guest-kernel), KVM did not protect indirect branches in L1 from steering by a malicious agent in L2. This could allow a malicious nested guest to carry out Spectre v2 attacks against L1 due to a missing IBPB at VM-exit time.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat currently provides the nested virtualization feature as a Technology Preview. Nested virtualization is therefore unsupported for production use. For more information please refer to https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-2196"
        },
        {
          "category": "external",
          "summary": "RHBZ#2160023",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160023"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2196",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-2196"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2196",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2196"
        }
      ],
      "release_date": "2022-09-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_intel\n# modprobe kvm_intel nested=0\n```",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks"
    },
    {
      "cve": "CVE-2022-2663",
      "cwe": {
        "id": "CWE-923",
        "name": "Improper Restriction of Communication Channel to Intended Endpoints"
      },
      "discovery_date": "2022-08-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2123056"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and it incorrectly matches on the message. An attacker could exploit this vulnerability to bypass firewall when users are using unencrypted IRC with nf_conntrack_irc configured.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: netfilter: nf_conntrack_irc message handling issue",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-2663"
        },
        {
          "category": "external",
          "summary": "RHBZ#2123056",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123056"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2663",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2663",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2663"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/netfilter-devel/20220826045658.100360-1-dgl@dgl.cx/T/",
          "url": "https://lore.kernel.org/netfilter-devel/20220826045658.100360-1-dgl@dgl.cx/T/"
        }
      ],
      "release_date": "2022-08-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent the module nf_conntrack_irc from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: netfilter: nf_conntrack_irc message handling issue"
    },
    {
      "cve": "CVE-2022-3028",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2022-08-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2122228"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A race condition was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition in xfrm_probe_algs can lead to OOB read/write",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is rated as having a Moderate impact because it can only be triggered by a privileged local user (with CAP_NET_ADMIN or root).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3028"
        },
        {
          "category": "external",
          "summary": "RHBZ#2122228",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122228"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3028",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3028"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3028",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3028"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/ba953a9d89a00c078b85f4b190bc1dde66fe16b5",
          "url": "https://github.com/torvalds/linux/commit/ba953a9d89a00c078b85f4b190bc1dde66fe16b5"
        }
      ],
      "release_date": "2022-07-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: race condition in xfrm_probe_algs can lead to OOB read/write"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Dongliang Mu"
          ]
        }
      ],
      "cve": "CVE-2022-3239",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-09-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2127985"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s video4linux driver in how a user triggers the em28xx_usb_probe() for the Empia 28xx-based TV cards. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: media: em28xx: initialize refcount before kref_get",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3239"
        },
        {
          "category": "external",
          "summary": "RHBZ#2127985",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127985"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3239",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3239"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3239",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3239"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c08eadca1bdfa099e20a32f8fa4b52b2f672236d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c08eadca1bdfa099e20a32f8fa4b52b2f672236d"
        }
      ],
      "release_date": "2022-02-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent module em28xx from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: media: em28xx: initialize refcount before kref_get"
    },
    {
      "cve": "CVE-2022-3522",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2022-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2150979"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in hugetlb_no_page in the mm/hugetlb.c file in the Linux Kernel, where a manipulation leads to a race condition. This flaw may allow a local attacker to cause a denial of service and can lead to a kernel information leak issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition in hugetlb_no_page() in mm/hugetlb.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3522"
        },
        {
          "category": "external",
          "summary": "RHBZ#2150979",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150979"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3522",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3522"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3522",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3522"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/all/20221004193400.110155-3-peterx@redhat.com/T/#u",
          "url": "https://lore.kernel.org/all/20221004193400.110155-3-peterx@redhat.com/T/#u"
        }
      ],
      "release_date": "2022-10-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: race condition in hugetlb_no_page() in mm/hugetlb.c"
    },
    {
      "cve": "CVE-2022-3524",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2022-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2150947"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak flaw was found in the Linux kernel\u2019s IPv6 functionality in how a user triggers the setsockopt of the IPV6_ADDRFORM and IPV6_DSTOPTS type. This flaw allows a user to crash the system if the setsockopt function is being called simultaneously with the IPV6_ADDRFORM type and other processes with the IPV6_DSTOPTS type. This issue is unlikely to happen unless a local process triggers IPV6_ADDRFORM.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory leak in ipv6_renew_options()",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3524"
        },
        {
          "category": "external",
          "summary": "RHBZ#2150947",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150947"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3524",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3524"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3524",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3524"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11"
        }
      ],
      "release_date": "2022-10-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: memory leak in ipv6_renew_options()"
    },
    {
      "cve": "CVE-2022-3564",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-10-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2150999"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated between Moderate and Important (similar to the CVE-2022-45934) because of no known attack, and the attack would be complex. Anyway, consider this CVE-2022-3564 as Important because the use-after-free can potentially lead to privilege escalation or a potential remote system crash (and currently, a read after-free that in most cases would not lead to a remote system crash).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3564"
        },
        {
          "category": "external",
          "summary": "RHBZ#2150999",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150999"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3564",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3564",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3564"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=89f9f3cb86b1c63badaf392a83dd661d56cc50b1",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=89f9f3cb86b1c63badaf392a83dd661d56cc50b1"
        }
      ],
      "release_date": "2022-10-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at BIOS level which will also provide an effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c"
    },
    {
      "cve": "CVE-2022-3566",
      "cwe": {
        "id": "CWE-366",
        "name": "Race Condition within a Thread"
      },
      "discovery_date": "2022-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2143893"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in the tcp subsystem in the Linux Kernel, due to a data race around icsk-\u003eicsk_af_ops. This issue could allow an attacker to leak internal kernel information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: data races around icsk-\u003eicsk_af_ops in do_ipv6_setsockopt",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3566"
        },
        {
          "category": "external",
          "summary": "RHBZ#2143893",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143893"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3566",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3566"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3566",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3566"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57"
        }
      ],
      "release_date": "2022-10-06T06:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: data races around icsk-\u003eicsk_af_ops in do_ipv6_setsockopt"
    },
    {
      "cve": "CVE-2022-3567",
      "cwe": {
        "id": "CWE-421",
        "name": "Race Condition During Access to Alternate Channel"
      },
      "discovery_date": "2022-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2143943"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A data race problem was found in sk-\u003esk_prot in the network subsystem in ipv6 in the Linux kernel. This issue occurs while some functions access critical data, leading to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: data races around sk-\u003esk_prot",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3567"
        },
        {
          "category": "external",
          "summary": "RHBZ#2143943",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143943"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3567",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3567"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3567",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3567"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6"
        }
      ],
      "release_date": "2022-10-06T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: data races around sk-\u003esk_prot"
    },
    {
      "cve": "CVE-2022-3619",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2022-12-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2154235"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak flaw was found in the Linux kernel\u2019s L2CAP bluetooth functionality. This issue occurs when a user generates malicious packets, triggering the l2cap_recv_acldata function. This flaw allows a local or bluetooth connection user to potentially crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3619"
        },
        {
          "category": "external",
          "summary": "RHBZ#2154235",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154235"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3619",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3619"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3619",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3619"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=97097c85c088e11651146da32a4e1cdb9dfa6193",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=97097c85c088e11651146da32a4e1cdb9dfa6193"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?id.211918",
          "url": "https://vuldb.com/?id.211918"
        }
      ],
      "release_date": "2022-10-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the customer portal at https://access.redhat.com/solutions/268293.\n\nAlternatively, bluetooth can be disabled within the hardware or at the BIOS level, which will also provide effective mitigation as the kernel will not detect Bluetooth hardware on the system.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c"
    },
    {
      "cve": "CVE-2022-3623",
      "cwe": {
        "id": "CWE-123",
        "name": "Write-what-where Condition"
      },
      "discovery_date": "2023-01-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2165721"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in follow_page_pte in mm/gup.c in the Linux Kernel. This issue occurs due to a race problem which can poison the page table entry and cause a denial-of-service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3623"
        },
        {
          "category": "external",
          "summary": "RHBZ#2165721",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165721"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3623",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3623"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3623",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3623"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=fac35ba763ed07ba93154c95ffc0c4a55023707f",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=fac35ba763ed07ba93154c95ffc0c4a55023707f"
        }
      ],
      "release_date": "2022-09-01T06:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry"
    },
    {
      "cve": "CVE-2022-3625",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-11-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2144720"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Netlink device interface implementation in the Linux kernel that improperly handled certain error conditions, leading to a use-after-free issue with some network device drivers. A local attacker with admin access to the network device could use this to cause a denial of service (system crash) or execute arbitrary code.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free after failed devlink reload in devlink_param_get",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3625"
        },
        {
          "category": "external",
          "summary": "RHBZ#2144720",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2144720"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3625",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3625"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3625",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3625"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=6b4db2e528f650c7fb712961aac36455468d5902",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=6b4db2e528f650c7fb712961aac36455468d5902"
        }
      ],
      "release_date": "2022-08-09T08:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free after failed devlink reload in devlink_param_get"
    },
    {
      "cve": "CVE-2022-3628",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "discovery_date": "2022-12-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2150960"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: USB-accessible buffer overflow in brcmfmac",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3628"
        },
        {
          "category": "external",
          "summary": "RHBZ#2150960",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150960"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3628",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3628",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3628"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295"
        },
        {
          "category": "external",
          "summary": "https://seclists.org/oss-sec/2022/q4/60",
          "url": "https://seclists.org/oss-sec/2022/q4/60"
        }
      ],
      "release_date": "2022-10-22T09:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent the brcmfmac module from being loaded. See https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: USB-accessible buffer overflow in brcmfmac"
    },
    {
      "cve": "CVE-2022-3707",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "discovery_date": "2022-10-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2137979"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3707"
        },
        {
          "category": "external",
          "summary": "RHBZ#2137979",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137979"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3707",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3707"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3707",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3707"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz@163.com/",
          "url": "https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz@163.com/"
        }
      ],
      "release_date": "2022-10-07T08:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed"
    },
    {
      "cve": "CVE-2022-4129",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-08-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2134528"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-4129"
        },
        {
          "category": "external",
          "summary": "RHBZ#2134528",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134528"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-4129",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-4129"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4129",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4129"
        }
      ],
      "release_date": "2022-08-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference"
    },
    {
      "cve": "CVE-2022-4662",
      "cwe": {
        "id": "CWE-455",
        "name": "Non-exit on Failed Initialization"
      },
      "discovery_date": "2022-12-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2155788"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An incorrect access control flaw was found in the Linux kernel USB core subsystem. When attaching a malicious usb device, the recursive locking violation in usb-storage can cause the kernel to deadlock. This issue could allow a local user to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Recursive locking violation in usb-storage that can cause the kernel to deadlock",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-4662"
        },
        {
          "category": "external",
          "summary": "RHBZ#2155788",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155788"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-4662",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-4662"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4662",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4662"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/all/20220913140355.910732567@linuxfoundation.org/",
          "url": "https://lore.kernel.org/all/20220913140355.910732567@linuxfoundation.org/"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/all/CAB7eexLLApHJwZfMQ=X-PtRhw0BgO+5KcSMS05FNUYejJXqtSA@mail.gmail.com/",
          "url": "https://lore.kernel.org/all/CAB7eexLLApHJwZfMQ=X-PtRhw0BgO+5KcSMS05FNUYejJXqtSA@mail.gmail.com/"
        }
      ],
      "release_date": "2022-09-13T09:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: Recursive locking violation in usb-storage that can cause the kernel to deadlock"
    },
    {
      "cve": "CVE-2022-20141",
      "cwe": {
        "id": "CWE-667",
        "name": "Improper Locking"
      },
      "discovery_date": "2022-08-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2114937"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s IGMP protocol in how a user triggers a race condition in the ip_check_mc_rcu function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-20141"
        },
        {
          "category": "external",
          "summary": "RHBZ#2114937",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114937"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-20141",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-20141"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-20141",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20141"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/igmp.c?h=v5.19\u0026id=23d2b94043ca8835bd1e67749020e839f396a1c2",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/igmp.c?h=v5.19\u0026id=23d2b94043ca8835bd1e67749020e839f396a1c2"
        }
      ],
      "release_date": "2021-07-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets"
    },
    {
      "cve": "CVE-2022-25265",
      "cwe": {
        "id": "CWE-281",
        "name": "Improper Preservation of Permissions"
      },
      "discovery_date": "2022-02-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2055499"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in the Linux kernel when certain binary files have the exec-all attribute with gcc. This issue can cause the execution of bytes located in the non-executable regions of a file.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Executable Space Protection Bypass",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-25265"
        },
        {
          "category": "external",
          "summary": "RHBZ#2055499",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2055499"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-25265",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-25265"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25265",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25265"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/blob/1c33bb0507508af24fd754dd7123bd8e997fab2f/arch/x86/include/asm/elf.h#L281-L294",
          "url": "https://github.com/torvalds/linux/blob/1c33bb0507508af24fd754dd7123bd8e997fab2f/arch/x86/include/asm/elf.h#L281-L294"
        },
        {
          "category": "external",
          "summary": "https://github.com/x0reaxeax/exec-prot-bypass",
          "url": "https://github.com/x0reaxeax/exec-prot-bypass"
        }
      ],
      "release_date": "2022-02-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Executable Space Protection Bypass"
    },
    {
      "cve": "CVE-2022-30594",
      "cwe": {
        "id": "CWE-276",
        "name": "Incorrect Default Permissions"
      },
      "discovery_date": "2022-05-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2085300"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag, possibly disabling seccomp.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-30594"
        },
        {
          "category": "external",
          "summary": "RHBZ#2085300",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085300"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30594",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30594",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30594"
        }
      ],
      "release_date": "2022-05-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "If ptrace is not required, ptrace can be disabled in multiple ways.\n\n   1. SELinux policy.\n\n   # setsebool -P deny_ptrace on\n\n   2. Kernel sysctl.\n\n   # sysctl -w kernel.yama.ptrace_scope=3\n\n   Or to make persistent , create\n\n   /etc/sysctl.d/99-yama-ptrace_scope.conf\n\n   kernel.yama.ptrace_scope=3\n\nIf you need further assistance, see the KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option"
    },
    {
      "cve": "CVE-2022-36879",
      "cwe": {
        "id": "CWE-911",
        "name": "Improper Update of Reference Count"
      },
      "discovery_date": "2022-07-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2119855"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s IP framework for transforming packets (XFRM subsystem). An error while resolving policies in xfrm_bundle_lookup causes the refcount to drop twice, leading to a possible crash and a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-36879"
        },
        {
          "category": "external",
          "summary": "RHBZ#2119855",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119855"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-36879",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-36879",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36879"
        }
      ],
      "release_date": "2022-06-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice"
    },
    {
      "cve": "CVE-2022-39188",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-09-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2130141"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in include/asm-generic/tlb.h in the Linux kernel due to a race condition (unmap_mapping_range versus munmap). This issue allows a device driver to free a page while it still has stale TLB entries.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue only occurs in situations with VM_PFNMAP virtual memory areas (VMAs).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-39188"
        },
        {
          "category": "external",
          "summary": "RHBZ#2130141",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130141"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-39188",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-39188",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-39188"
        },
        {
          "category": "external",
          "summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2329",
          "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2329"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b67fbebd4cf980aecbcc750e1462128bffe8ae15",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b67fbebd4cf980aecbcc750e1462128bffe8ae15"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/stable/20220831191348.3388208-1-jannh@google.com/T/#u",
          "url": "https://lore.kernel.org/stable/20220831191348.3388208-1-jannh@google.com/T/#u"
        }
      ],
      "release_date": "2022-07-06T16:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry"
    },
    {
      "cve": "CVE-2022-39189",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-09-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2124788"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the x86 KVM subsystem in kvm_steal_time_set_preempted in arch/x86/kvm/x86.c in the Linux kernel. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "With the current usecase, attacker need a root privileges to exploit this flaw, however there may have ways to defeat this either, but in both cases it seems that Attack Complexity is high (AC:H)",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-39189"
        },
        {
          "category": "external",
          "summary": "RHBZ#2124788",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124788"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-39189",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-39189"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-39189",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-39189"
        },
        {
          "category": "external",
          "summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2309",
          "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2309"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cd88243c7e03845a450795e134b488fc2afb736",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cd88243c7e03845a450795e134b488fc2afb736"
        }
      ],
      "release_date": "2022-05-30T03:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning"
    },
    {
      "cve": "CVE-2022-41218",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-08-31T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2122960"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s dvb-core subsystem (DVB API used by Digital TV devices) in how a user physically removed a USB device (such as a DVB demultiplexer device) while running malicious code. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Report vmalloc UAF in dvb-core/dmxdev",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Keeping this issue Moderate because the impact is limited: only when the user uses the dvb-core module and removes the USB device triggers the attack. This kind of race condition is hard to trigger and requires several preconditions.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-41218"
        },
        {
          "category": "external",
          "summary": "RHBZ#2122960",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122960"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41218",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41218",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41218"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/all/20220908132754.30532-1-tiwai@suse.de/",
          "url": "https://lore.kernel.org/all/20220908132754.30532-1-tiwai@suse.de/"
        }
      ],
      "release_date": "2022-09-23T08:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent the module dvb-core from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Report vmalloc UAF in dvb-core/dmxdev"
    },
    {
      "cve": "CVE-2022-41674",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "discovery_date": "2022-10-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2134377"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer overflow flaw was found in the u8 overflow in cfg80211_update_notlisted_nontrans() in net/wireless/scan.c in the Linux kernel\u2019s wifi subcomponent. This flaw allows an attacker to crash the system or leak internal kernel information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: u8 overflow problem in cfg80211_update_notlisted_nontrans()",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-41674"
        },
        {
          "category": "external",
          "summary": "RHBZ#2134377",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134377"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41674",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-41674"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41674",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41674"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2022/10/13/2",
          "url": "https://www.openwall.com/lists/oss-security/2022/10/13/2"
        }
      ],
      "release_date": "2022-10-13T10:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: u8 overflow problem in cfg80211_update_notlisted_nontrans()"
    },
    {
      "cve": "CVE-2022-42703",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-10-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2133483"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak flaw with use-after-free capability was found in the Linux kernel. The VMA mm/rmap.c functionality in the is_mergeable_anon_vma() function continuously forks, using memory operations to trigger an incorrect reuse of leaf anon_vma. This issue allows a local attacker to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free related to leaf anon_vma double reuse",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-42703"
        },
        {
          "category": "external",
          "summary": "RHBZ#2133483",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133483"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42703",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42703",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42703"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2555283eb40df89945557273121e9393ef9b542b",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2555283eb40df89945557273121e9393ef9b542b"
        }
      ],
      "release_date": "2022-10-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free related to leaf anon_vma double reuse"
    },
    {
      "cve": "CVE-2022-42720",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-10-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2134451"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in bss_ref_get in the net/wireless/scan.c in\u00a0the Linux kernel. This issue can lead to a denial of service or arbitrary code execution.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in bss_ref_get in net/wireless/scan.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-42720"
        },
        {
          "category": "external",
          "summary": "RHBZ#2134451",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134451"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42720",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-42720"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42720",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42720"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2022/10/13/2",
          "url": "https://www.openwall.com/lists/oss-security/2022/10/13/2"
        }
      ],
      "release_date": "2022-10-13T10:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria, comprised of ease of use and deployment, applicability to widespread installation base, and stability.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in bss_ref_get in net/wireless/scan.c"
    },
    {
      "cve": "CVE-2022-42721",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2022-10-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2134506"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A list corruption flaw was found in cfg80211_add_nontrans_list in the net/wireless/scan.c function in the Linux kernel. This flaw could lead to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-42721"
        },
        {
          "category": "external",
          "summary": "RHBZ#2134506",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134506"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42721",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-42721"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42721",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42721"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2022/10/13/2",
          "url": "https://www.openwall.com/lists/oss-security/2022/10/13/2"
        }
      ],
      "release_date": "2022-10-13T10:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c"
    },
    {
      "cve": "CVE-2022-42722",
      "cwe": {
        "id": "CWE-705",
        "name": "Incorrect Control Flow Scoping"
      },
      "discovery_date": "2022-10-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2134517"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in P2P-Device in wifi in ieee80211_rx_h_decrypt in net/mac80211/rx.c in the Linux kernel, leading to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Denial of service in beacon protection for P2P-device",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-42722"
        },
        {
          "category": "external",
          "summary": "RHBZ#2134517",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134517"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42722",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-42722"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42722",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42722"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2022/10/13/2",
          "url": "https://www.openwall.com/lists/oss-security/2022/10/13/2"
        }
      ],
      "release_date": "2022-10-13T10:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent module mac80211 from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Denial of service in beacon protection for P2P-device"
    },
    {
      "cve": "CVE-2022-43750",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2022-10-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2151270"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds memory write flaw in the Linux kernel\u2019s USB Monitor component was found in how a user with access to the /dev/usbmon can trigger it by an incorrect write to the memory of the usbmon. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory corruption in usbmon driver",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-43750"
        },
        {
          "category": "external",
          "summary": "RHBZ#2151270",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151270"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-43750",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43750",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43750"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/a659daf63d16aa883be42f3f34ff84235c302198",
          "url": "https://github.com/torvalds/linux/commit/a659daf63d16aa883be42f3f34ff84235c302198"
        }
      ],
      "release_date": "2022-09-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: memory corruption in usbmon driver"
    },
    {
      "cve": "CVE-2022-47929",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2023-01-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2168246"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux kernel. This issue may allow a local unprivileged user to trigger a denial of service if the alloc_workqueue function return is not validated in time of failure, resulting in a system crash or leaked internal kernel information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: NULL pointer dereference in traffic control subsystem",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-47929"
        },
        {
          "category": "external",
          "summary": "RHBZ#2168246",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168246"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-47929",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-47929",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-47929"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407"
        }
      ],
      "release_date": "2023-01-09T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "The mitigation is to disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n```\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n```",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: NULL pointer dereference in traffic control subsystem"
    },
    {
      "cve": "CVE-2022-48695",
      "discovery_date": "2024-05-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2278999"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A user after-free vulnerability was found in the Linux kernel in the refcount_t variable when performing the controller reset. This issue could lead to denial of service of the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: scsi: mpt3sas: Fix use-after-free warning",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-48695"
        },
        {
          "category": "external",
          "summary": "RHBZ#2278999",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278999"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-48695",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-48695"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48695",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48695"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2024050348-CVE-2022-48695-8a9e@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2024050348-CVE-2022-48695-8a9e@gregkh/T"
        }
      ],
      "release_date": "2024-05-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: scsi: mpt3sas: Fix use-after-free warning"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Kyle Zeng"
          ]
        }
      ],
      "cve": "CVE-2023-0394",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2023-01-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2162120"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: NULL pointer dereference in rawv6_push_pending_frames",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-0394"
        },
        {
          "category": "external",
          "summary": "RHBZ#2162120",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162120"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0394",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0394",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0394"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2023/01/18/2",
          "url": "https://www.openwall.com/lists/oss-security/2023/01/18/2"
        }
      ],
      "release_date": "2023-01-17T17:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: NULL pointer dereference in rawv6_push_pending_frames"
    },
    {
      "cve": "CVE-2023-0461",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2023-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2176192"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: net/ulp: use-after-free in listening ULP sockets",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Versions of Red Hat Enterprise Linux before 8 are not affected by this vulnerability as they did not include the upstream commit 734942c (\"tcp: ULP infrastructure\").",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-0461"
        },
        {
          "category": "external",
          "summary": "RHBZ#2176192",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176192"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0461",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-0461"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c",
          "url": "https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c"
        }
      ],
      "release_date": "2023-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent module tls from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: net/ulp: use-after-free in listening ULP sockets"
    },
    {
      "cve": "CVE-2023-1095",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-12-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2173973"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s netfilter subsystem. The issue could occur due to an error in nf_tables_updtable while freeing a transaction object not placed on the list head. This flaw allows a local, unprivileged user to crash the system, resulting in a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-1095"
        },
        {
          "category": "external",
          "summary": "RHBZ#2173973",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173973"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1095",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-1095"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1095",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1095"
        }
      ],
      "release_date": "2022-08-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "This flaw can be mitigated by preventing the affected netfilter kernel module from being loaded. For instructions on how to blacklist a kernel module, please see https://access.redhat.com/solutions/41278.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Pumpkin (@u1f383)"
          ],
          "organization": "DEVCORE Internship Program, and NYCU Software Security LAB"
        }
      ],
      "cve": "CVE-2023-1195",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-12-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2154171"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in reconn_set_ipaddr_from_hostname in fs/cifs/connect.c in the Linux kernel. The issue occurs when it forgets to set the free pointer server-\u003ehostname to NULL, leading to an invalid pointer request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-1195"
        },
        {
          "category": "external",
          "summary": "RHBZ#2154171",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154171"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1195",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-1195"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1195",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1195"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621",
          "url": "https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621"
        }
      ],
      "release_date": "2022-10-02T06:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c"
    },
    {
      "cve": "CVE-2023-1582",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2023-03-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2180936"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A race problem was found in fs/proc/task_mmu.c in the memory management sub-component in the Linux kernel. This issue may allow a local attacker with user privilege to cause a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Soft lockup occurred during __page_mapcount",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw applies only to RHEL 8.7 kernel version.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-1582"
        },
        {
          "category": "external",
          "summary": "RHBZ#2180936",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180936"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1582",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-1582"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1582",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1582"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-mm/Yg6ac8WlwtnDH6M0@kroah.com/",
          "url": "https://lore.kernel.org/linux-mm/Yg6ac8WlwtnDH6M0@kroah.com/"
        }
      ],
      "release_date": "2022-02-11T06:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "This flaw can be mitigated by disabling THP on the system.\n~~~\nHow to disable THP ? \nhttps://access.redhat.com/solutions/1320153\n~~~",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Soft lockup occurred during __page_mapcount"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Wei Chen"
          ]
        }
      ],
      "cve": "CVE-2023-2177",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2023-04-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2187953"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference issue was found in the SCTP network protocol in net/sctp/stream_sched.c in the Linux kernel. If stream_in allocation fails, stream_out is freed, which would be accessed further. This flaw allows a local user to crash the system or potentially cause a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-2177"
        },
        {
          "category": "external",
          "summary": "RHBZ#2187953",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187953"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-2177",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-2177"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-2177",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2177"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=181d8d2066c0",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=181d8d2066c0"
        }
      ],
      "release_date": "2022-07-25T12:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common"
    },
    {
      "cve": "CVE-2023-22998",
      "cwe": {
        "id": "CWE-436",
        "name": "Interpretation Conflict"
      },
      "discovery_date": "2023-03-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2182429"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel before 6.0.3, drivers/gpu/drm/virtio/virtgpu_object.c misinterprets the drm_gem_shmem_get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: drm/virtio: improper return value check in virtio_gpu_object_shmem_init()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Enterprise Linux 6 and 7 are not affected by this flaw as they did not include the `virtio_gpu_object_shmem_init` function, introduced upstream in commit 2f2aa13 (\"drm/virtio: move virtio_gpu_mem_entry initialization to new function\").",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-22998"
        },
        {
          "category": "external",
          "summary": "RHBZ#2182429",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182429"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-22998",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-22998"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-22998",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-22998"
        }
      ],
      "release_date": "2023-02-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: drm/virtio: improper return value check in virtio_gpu_object_shmem_init()"
    },
    {
      "cve": "CVE-2023-23454",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2023-01-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2168297"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds (OOB) read problem was found in cbq_classify in net/sched/sch_cbq.c in the Linux kernel. This issue may allow a local attacker to cause a denial of service due to type confusion. Non-negative numbers could indicate a TC_ACT_SHOT condition rather than valid classification results.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: slab-out-of-bounds read vulnerabilities in cbq_classify",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
          "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
          "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-23454"
        },
        {
          "category": "external",
          "summary": "RHBZ#2168297",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168297"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-23454",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23454",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23454"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=caa4b35b4317d5147b3ab0fbdc9c075c7d2e9c12",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=caa4b35b4317d5147b3ab0fbdc9c075c7d2e9c12"
        }
      ],
      "release_date": "2023-01-01T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-16T08:43:55+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2736"
        },
        {
          "category": "workaround",
          "details": "The mitigation is to disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n```\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n```\nIt is also possible to prevent the affected code from being loaded by blacklisting the `cbq` kernel module. For instructions on how to blacklist a kernel module, please see https://access.redhat.com/solutions/41278.",
          "product_ids": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "NFV-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "NFV-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.src",
            "RT-8.8.0.GA:kernel-rt-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-core-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-devel-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-kvm-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64",
            "RT-8.8.0.GA:kernel-rt-modules-extra-0:4.18.0-477.10.1.rt7.274.el8_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: slab-out-of-bounds read vulnerabilities in cbq_classify"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.